US9195491B2 - Migrating middlebox state for distributed middleboxes - Google Patents

Migrating middlebox state for distributed middleboxes Download PDF

Info

Publication number
US9195491B2
US9195491B2 US13/678,520 US201213678520A US9195491B2 US 9195491 B2 US9195491 B2 US 9195491B2 US 201213678520 A US201213678520 A US 201213678520A US 9195491 B2 US9195491 B2 US 9195491B2
Authority
US
United States
Prior art keywords
middlebox
host
state
logical
readable medium
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US13/678,520
Other versions
US20130125120A1 (en
Inventor
Ronghua Zhang
Teemu Koponen
Pankaj THAKKAR
Amar Padmanabhan
W. Andrew Lambeth
Martin Casado
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nicira Inc
Original Assignee
Nicira Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nicira Inc filed Critical Nicira Inc
Priority to US13/678,520 priority Critical patent/US9195491B2/en
Assigned to NICIRA, INC. reassignment NICIRA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CASADO, MARTIN, KOPONEN, TEEMU, LAMBETH, W. ANDREW, PADMANABHAN, AMAR, THAKKAR, PANKAJ, ZHANG, RONGHUA
Publication of US20130125120A1 publication Critical patent/US20130125120A1/en
Priority to US14/942,948 priority patent/US9552219B2/en
Application granted granted Critical
Publication of US9195491B2 publication Critical patent/US9195491B2/en
Priority to US15/398,689 priority patent/US10235199B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • G06F15/177Initialisation or configuration control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • H04L12/2424
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/64Routing or path finding of packets in data switching networks using an overlay routing layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/70Virtual switches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2517Translation of Internet protocol [IP] addresses using port numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2521Translation architectures other than single NAT servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/15Interconnection of switching modules

Definitions

  • Networks have traditionally been managed through low-level configuration of individual network components. Network configurations often depend on the underlying network: for example, blocking a user's access with an access control list (“ACL”) entry requires knowing the user's current IP address. More complicated tasks require more extensive network knowledge: for example, forcing guest users' port 80 traffic to traverse an HTTP proxy requires knowing the current network topology and the location of each guest. This process is of increased difficulty where the network switching elements are shared across multiple users.
  • ACL access control list
  • SDN Software-Defined Networking
  • a network controller running on one or more servers in a network, controls, maintains, and implements control logic that governs the forwarding behavior of shared network switching elements on a per user basis. Making network management decisions often requires knowledge of the network state.
  • the network controller creates and maintains a view of the network state and provides an application programming interface upon which management applications may access a view of the network state.
  • Some of the primary goals of maintaining large networks are scalability, mobility, and multi-tenancy. Many approaches taken to address one of these goals result in hampering at least one of the others. For instance, one can easily provide network mobility for virtual machines within an L 2 domain, but L 2 domains cannot scale to large sizes. Furthermore, retaining user isolation greatly complicates mobility. As such, improved solutions that can satisfy the scalability, mobility, and multi-tenancy goals are needed.
  • Some embodiments of the invention provide a network control system that allows a user to specify a logical network that includes one or more logical forwarding elements (e.g., logical switches, logical routers, etc.) and one or more middleboxes (e.g., firewalls, load balancers, network address translators, intrusion detection systems (IDS), wide area network (WAN) optimizers, etc.).
  • the system implements the user-specified logical forwarding elements across numerous managed switching elements on numerous physical machines that also host virtual machines of the logical network.
  • the system implements the user-specified middleboxes across the numerous physical machines.
  • the system of some embodiments configures, in one host machine, a managed switching element that implements at least part of the logical switching elements, a distributed middlebox instance that provides a middlebox service to the packets forwarded by the managed switching element, and one or more virtual machines (VMs).
  • a managed switching element that implements at least part of the logical switching elements
  • a distributed middlebox instance that provides a middlebox service to the packets forwarded by the managed switching element
  • VMs virtual machines
  • the distributed middlebox instance of some embodiments running in the source host, sends the state information related to the VM to the distributed middlebox instance running in the destination host. Using the states, the distributed middlebox instance running in the destination host resumes the middlebox service to the particular VM.
  • a distributed middlebox instance of different embodiments sends the state information related to the migrating VM to the distributed middlebox instance running in the destination host differently.
  • the distributed middlebox instance running in the source host uses a pre-notification sent by a VM migration manager before the VM is migrated.
  • the distributed middlebox instance running in the source host gathers all middlebox state that is related to the migrating VM and sends the gathered state to the VM migration manager.
  • the VM continues to operate in the source host and the distributed middlebox instance running in the source host supplies the state updates to the VM migration manager.
  • the VM migration manager stuns the VM at the source host and migrates the VM to the destination host, the VM migration manager also migrates the middlebox state related to the VM to the destination host.
  • the VM migration manager running in the destination host then provisions the VM at the destination host and sends the middlebox state to the distributed middlebox instance running in the destination host.
  • the distributed middlebox instance running in the destination host resumes the middlebox service to the migrated VM.
  • the VM migration manager does not support pre-notification messages.
  • the distributed middlebox instance running at the source host still uses the VM migration manager to send the middlebox state related to the VM to the destination host.
  • the middlebox state migration starts after the VM migrates to the destination host.
  • the network control system configures the distributed middlebox instances to interact with the VM migration managers to migrate the middlebox state for migrating VMs. In some embodiments, the network control system configures the distributed middlebox by sending the middlebox configuration data to the distributed middlebox instances. The network control system configures the distributed middlebox in a similar way to how the network control system configures the managed switching elements to perform logical forwarding processing of the logical switching elements of a user.
  • the network control system has several controllers including logical controllers and physical controllers.
  • a logical controller is a master of logical switching elements of a user.
  • a logical controller of some embodiments receives specification of the logical switching elements from the user, in the form of logical control plane (LCP) data.
  • the logical controller translates the LCP data into logical forwarding plane (LFP) data, which define the control plane and the forwarding plane of the logical switching elements.
  • the logical controller then translates the LFP data to universal physical control plane (UPCP) data.
  • the logical controller identifies a set of physical controllers, each of which is responsible for managing a managed switching element.
  • the logical controller sends the UPCP data only to the identified set of physical controllers that manage managed switching elements each of which at least partially implements the logical switching elements of the user.
  • a physical controller translates the UPCP data into customized physical control plane (CPCP) data, which is control plane data for the managed switching elements that implement the logical switching elements.
  • CPCP physical control plane
  • a physical controller sends the CPCP data to the managed switching element.
  • the managed switching elements then translate the customized control plane to perform the logical forwarding processing of the logical switching elements specified by the user.
  • a logical controller receives configuration data for configuring the middlebox.
  • the logical controller identifies the same set of physical controllers which are masters of the managed switching elements that implement, at least partially, the logical switching elements specified by the user.
  • the logical controller sends the middlebox configuration data to the identified set of physical controllers.
  • the physical controller of some embodiments then sends the middlebox configuration data to the managed switching elements so that the managed switching elements can send the middlebox configuration data to the distributed middlebox instances.
  • the physical controller sends the middlebox configuration data directly to the distributed middlebox instance, which is hosted in the same physical machine as the managed switching elements of which the physical controller is the master.
  • FIG. 1 conceptually illustrates a logical network topology of some embodiments that is implemented in a managed network in a distributed fashion.
  • FIG. 2 illustrates an example middlebox state migration from a source host to a destination host as a VM is migrating from the source host to the destination host.
  • FIG. 3 illustrates an example middlebox state migration from a source host to a destination host after a VM has migrated from the source host to the destination host.
  • FIG. 4 illustrates an example of such a state sharing mechanism.
  • FIG. 5 illustrates an example middlebox state migration from a source host to a destination host as VM is migrating from the source host to the destination host.
  • FIG. 6 illustrates an example middlebox state migration from a source host to a destination host after VM has migrated from the source host to the destination host.
  • FIG. 7 illustrates a network control system of some embodiments for configuring MSEs and distributed middlebox elements in order to implement logical networks.
  • FIG. 8 conceptually illustrates the propagation of data through the network control system of some embodiments.
  • FIG. 9 illustrates example architecture of a network controller.
  • FIG. 10 conceptually illustrates an electronic system with which some embodiments of the invention are implemented.
  • a distributed middlebox instance of some embodiments that implements the middlebox may provide middlebox service to one or more virtual machines (VM) that are running in the same host as the distributed middlebox instance.
  • VM virtual machines
  • the distributed middlebox instance of some embodiments sends the state related to the particular VM to the distributed middlebox instance running in the second host. Using the state, the distributed middlebox instance running in the second host resumes the middlebox service to the particular VM.
  • Section II describes a network control system.
  • Section III describes an electronic system that implements some embodiments of the invention.
  • FIG. 1 conceptually illustrates a logical network topology 100 of some embodiments that is implemented in a managed network in a distributed fashion. Shown in the top half of the figure, network topology 100 is a simplified network for purposes of explanation.
  • the network includes two logical L 2 switches 105 and 110 connected by a logical L 3 router 115 .
  • the logical switch 105 connects virtual machines 120 and 125
  • the logical switch 110 connects virtual machines 130 and 135 .
  • the logical router 115 also connects to an external network 145 .
  • a middlebox 140 attaches to the logical router 115 .
  • the network topology 100 represents just one particular logical network topology into which a middlebox may be incorporated.
  • the middlebox may be located directly between two other components (e.g., directly between the gateway and logical router in order to monitor and process all traffic entering or exiting the logical network), or in other locations in a more complex network.
  • the middlebox 140 is not located within the direct traffic flow, either from one domain to the other, or between the external world and the domain. Accordingly, packets will not be sent to the middlebox unless routing policies are specified (e.g., by a user such as a network administrator) for the logical router 115 that determine which packets should be sent to the middlebox for processing. Some embodiments enable the use of policy routing rules, which forward packets based on data beyond the destination address (e.g., destination IP or MAC address).
  • a user might specify (e.g., through a network controller application programming interface (API)) that all packets with a source IP address in the logical subnet switched by logical switch 105 or all packets that enter the network from the external network 195 destined for the logical subnet switched by the logical switch 110 , should be directed to the middlebox 140 for processing.
  • API application programming interface
  • a firewall analyzes data packets to determine whether or not the packets should be allowed through (i.e., similar to ACL flow entries).
  • the firewall stores a set of rules (e.g., entered by a user), that determine whether or not the firewall drops (i.e., discards) or allows the packet through (or, in some cases, rejects the packet by dropping the packet and sending an error response back to the sender).
  • the firewall is a stateful firewall that keeps track of transport (e.g., TCP and/or UDP) connections, and uses the stored state information to allow the packets that belong to an open transport connection to pass through.
  • Source network address translation modifies the source IP address of packets in the packet headers. For instance, SNAT may be used so that the IP addresses of numerous different machines with different IP addresses can be hidden from destination machines by changing the source of packets from the different machines to a single IP address.
  • Destination network address translation similarly modifies the destination IP address of packets in order to hide the real IP addresses from the source machines.
  • Load balancing is a form of D-NAT that uses various algorithms (e.g., round robin, random assignment, etc.) to balance traffic across numerous destination machines.
  • a load balancer receives a packet for a specific IP address that is exposed to the source machine and modifies the destination IP address of the packet to match up with a particular one of the destination machines selected by the load balancing algorithm.
  • An intrusion detection system is a passive middlebox in some embodiments that monitors the logical network for malicious activities or policy violations.
  • the IDS may examine transport connections (e.g., TCP connections, UDP connections, etc.) to determine whether an attack on the network is occurring.
  • a WAN optimizer is a middlebox device for increasing the efficiency of data transfers across a WAN (e.g., accelerating the flow of data across the WAN).
  • WAN optimization techniques include data deduplication, data compression, latency optimization, caching and/or proxying, forward error correction, protocol spoofing, traffic shaping, equalizing, connection limiting, simple rate limiting, etc. While the above is a list of some of the several different middleboxes, one of ordinary skill in the art will recognize that some embodiments may include various different middleboxes that may be implemented in a distributed manner.
  • the bottom half of FIG. 1 conceptually illustrates such a distributed implementation 150 of some embodiments. Specifically, the bottom half of this figure illustrates several nodes, including a first host machine 155 , a second host machine 160 , a third host machine 165 , and an Nth host machine 170 . Each of the first three nodes hosts several virtual machines of the network 100 , with virtual machine 120 hosted on the first host machine 155 , virtual machines 125 and 135 hosted on the second host machine 160 , and virtual machine 130 hosted on the third host machine 165 .
  • each of the host machines includes a managed switching element (“MSE”).
  • the managed switching elements of some embodiments are software forwarding elements that implement logical forwarding elements for one or more logical networks.
  • the MSEs in the hosts 155 - 170 include flow entries in forwarding tables that implement the logical forwarding elements of the network 100 .
  • the MSEs on the host machines implement the logical switches 105 and 110 , as well as the logical router 115 .
  • some embodiments only implement logical switches at a particular node when at least one virtual machine connected to the logical switch is located at the node (i.e., only implementing logical switch 105 and logical router 115 in the MSE at host 155 ).
  • the implementation 150 of some embodiments also includes a pool node 195 that connects to the host machines.
  • the MSEs residing on the host perform first-hop processing. That is, these MSEs are the first forwarding elements a packet reaches after being sent from a virtual machine, and attempt to perform all of the logical switching and routing at this first hop.
  • a particular MSE may not store flow entries containing all of the logical forwarding information for a network, and therefore may not know what to do with a particular packet.
  • the MSE sends the packet to a pool node 195 for further processing.
  • These pool nodes are interior managed switching elements which, in some embodiments, store flow entries that encompass a larger portion of the logical network than the edge software switching elements.
  • the middlebox 140 is distributed across middlebox elements on these hosts 155 - 165 .
  • a middlebox module (or set of modules) resides on the host machines (e.g., operating in the hypervisor of the host, etc.).
  • the input includes a configuration from the middlebox. For instance, for a firewall, the user would input a set of rules for packet filtering (e.g., based on IP address, TCP connection, etc.).
  • the network control system that is used to provision the managed switching elements to implement the logical forwarding elements may also be used to provision the various middlebox elements operating on the host machines.
  • the controller identifies the particular nodes over which the middlebox configuration should be implemented, and distributes the configuration to these nodes (e.g., through a set of controllers).
  • the packet When one of the virtual machines sends a packet (e.g., to another one of the virtual machines, to an external address, etc.), the packet initially goes to the local MSE for processing.
  • the MSE may use its stored flow entries to make a forwarding decision to send the packet to the middlebox, in which case, some embodiments send the packet to the local middlebox element (i.e., a distributed middlebox instance) on the same host.
  • the middlebox element and the MSE negotiate a software port through which to transfer packets with minimal delay.
  • the middlebox processes the packet, some embodiments then send the packet back to the MSE through this same port. In some embodiments, this packet is sent from the middlebox to the MSE as a new packet, and therefore requires new processing by the MSE.
  • the middlebox may block or drop the packet.
  • some embodiments of the middlebox are passive, and duplicates of the packets are sent to the middlebox in order for the middlebox to keep track of statistics, but are not sent back to the switching element.
  • FIG. 1 illustrates only one logical network implemented across the hosts 155 - 170
  • some embodiments implement numerous logical networks (e.g., for different users or tenants) across the set of hosts.
  • a middlebox element on a particular host might actually store configurations for several different firewalls belonging to several different logical networks.
  • a firewall element may be virtualized to implement two (or more) different firewalls. These will effectively operate as two separate middlebox instances, such that the middlebox element is sliced into several “virtual” middleboxes (of the same type).
  • some embodiments append (e.g., prepend) a slice identifier (or tag) on the packet to identify to which of the several virtual middleboxes the packet is being sent.
  • slice identifier or tag
  • the slice identifier will need to identify the particular middlebox slice rather than just the logical network to which the packet belongs.
  • Different embodiments may use different slice identifiers for the middleboxes.
  • the slice identifier that identifies a virtual middlebox serving for the logical network may not be sufficient to identify middlebox state for each of the VMs running in the same host.
  • Some embodiments provide a VM-specific identifier for identifying the middlebox state of each of the VMs.
  • the MSE that forwards packets between these VMs and the virtual middlebox provides the VM-specific identifiers for the VMs.
  • the VM-specific identifiers are used to extract the state information of a particular VM when the particular VM migrates from one host to another host.
  • middleboxes examples include firewalls, SNATs, and load balancers.
  • the middlebox plays an active role in the packet processing (i.e., SNATs and load balancers modify source and destination addresses of the packets, respectively, while firewalls make decisions as to whether to allow or drop packets).
  • SNATs and load balancers modify source and destination addresses of the packets, respectively, while firewalls make decisions as to whether to allow or drop packets.
  • each of these middlebox elements on a particular node can function on its own without requiring information from the corresponding middlebox elements on the other nodes.
  • Even distributed load balancer elements can each separately load balance incoming traffic across different virtual machines with the assumption that none of the virtual machines are likely to become overloaded so long as the other load balancer elements use the same algorithm. Nevertheless, in some embodiments, the load balancer elements will share state (e.g., after querying the destination virtual machines for usage and health statistics) at some level.
  • middleboxes establish state for connections between machines (e.g., between two virtual machines in the network, between a VM in the network and an external machine, etc.).
  • the middlebox establishes a state for each transport layer connection (e.g., TCP connection, UDP connection).
  • transport layer connection e.g., TCP connection, UDP connection.
  • a middlebox element operating at a particular host machine creates state for the transport connections passing through it, but does not need to share this state with the other middlebox elements operating on the other host machines.
  • state information that does not have to be shared among the middlebox elements include the transport connection state (e.g., IP addresses and ports, TCP sequence numbers, etc.), mapping between original and translated addresses and port numbers, timestamps for detecting dead connections, etc.
  • FIG. 2 illustrates an example middlebox state migration from a source host to a destination host as a VM is migrating from the source host to the destination host.
  • this figure illustrates in terms of four different stages 205 - 220 that a middlebox element running in a host uses a VM migration manager to send state to another middlebox element running in another host.
  • a VM migration manager is a software application running in a host that manages migration of a VM into or out of the host.
  • a VM migration manager is part of a hypervisor of the host, which provisions and manages the VMs in the host in some embodiments.
  • the VM migration manager is a stand-alone software application.
  • VM migration managers running in different hosts cooperate when migrating VMs to and from the different hosts.
  • a VM migration manager of a host communicates with other software components (e.g., middlebox elements and MSEs) running in the host to gather any state related to a VM that is migrating to another host and sends the gathered state to the other host along with the VM.
  • FIG. 2 illustrates that the middlebox elements 225 and 230 in the hosts 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element.
  • this figure illustrates that the hosts 155 and 165 each have a VM migration manager.
  • the VM migration manager 235 of the host 155 pre-notifies the middlebox element 225 that VM 1 that is currently running in the host 155 is going to be migrated to another host.
  • the network control system configures the middlebox element running in a host in such a way that the middlebox registers for a callback from the VM migration manager in the event of VM migration. Configuring a middlebox element will be described in detail further below by reference to FIGS. 7 and 8 .
  • the middlebox element 225 is configured to register for a callback from the VM migration manager 235 and thus the VM migration manager 235 sends a pre-notification to the middlebox element 225 .
  • the middlebox element 225 identifies the middlebox state related to the VM 250 and sends the state to the VM migration manager 235 .
  • a VM running in a host is associated with a slice identifier for identifying a particular slice of the middlebox element that performs middlebox service on the packets coming to and from a VM that belongs to a particular logical network. As mentioned above, in some embodiments, this slice identifier is for appending to the packets.
  • a VM running in a host is associated with a VM-specific identifier when another VM that belongs to the same logical network is running in the same host.
  • this VM-specific identifier is for identifying the VM-specific middlebox state within the identified slice of the middlebox element.
  • the middlebox element of some embodiments uses the VM-specific identifier and the slice identifier to identify the slice of the middlebox element for the VM and gathers the state for the VM from the identified slice.
  • the middlebox element of some embodiments sends the gathered state for the VM and sends the state to the VM migration manager. Also, as the VM continues to function in the source host, the state related to the VM may also change. The middlebox element identifies these changes and sends the changes to the VM migration manager until the VM migration manager stuns the VM to move the VM to the destination host.
  • the third stage 215 shows that the VM migration manager 235 has stunned the VM 250 and is sending the middlebox state of the VM 250 and the VM 250 (e.g., the VM's state) to the host 165 , which is the destination host to which the VM 250 is migrating in this example.
  • the VM migration manager of the source host sends the middlebox state and the VM state to the VM migration manager of the destination host.
  • the VM migration manager at the destination host provisions the migrating VM in the destination host and provides the middlebox state to the middlebox element running in the destination host.
  • the fourth stage 220 shows that the VM migration manager 240 of the host 165 has received the state from the VM migration manager 235 of the host 155 and has sent the middlebox state to the middlebox element 230 of the host 165 .
  • the network control system configures the middlebox element running in a host in such a way that the middlebox registers for a callback from the VM migration manager in the event of a new VM being provisioned in the host.
  • the middlebox element 230 is configured to register for such a callback from the VM migration manager 240 and thus the VM migration manager 240 sends a pre-notification to the middlebox element 230 .
  • the VM migration manager 240 sends the middlebox state of the migrating VM 250 along with the pre-notification.
  • the VM migration manager 240 also starts the VM 250 in the host 165 .
  • the middlebox element 230 of some embodiments creates a middlebox slice for VM 250 (if there is not a slice of the middlebox element for the logical network that the VM 250 belongs to) and uses the middlebox state received from the VM migration manager 240 to resume the middlebox service to the VM 250 .
  • the fourth stage 220 also shows that the VM 250 is not in the host 155 and the middlebox element 225 does not have the middlebox state for the VM 250 .
  • the middlebox element of the source host explicitly deletes the middlebox state related to the VM migrated out of the source host.
  • the middlebox element of the source host lets the middlebox state of the migrated VM expire (e.g., by garbage-collecting the middlebox states that have an expired time to live (TTL)).
  • TTL time to live
  • FIG. 3 illustrates in four stages 305 - 320 an example middlebox state migration from a source host to a destination host after a VM has migrated from the source host to the destination host.
  • the middlebox element running in the source host uses a VM migration manager to send state to another middlebox element running in another host.
  • the VM migration manager in this example does not send a pre-notification for imminent VM migration to the middlebox element.
  • FIG. 3 illustrates that the middlebox elements 325 and 330 in the hosts 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element.
  • this figure illustrates that the hosts 155 and 165 each have a VM migration manager.
  • the first stage 305 also shows that the VM migration manager 335 of the host 155 has migrated VM 350 from the host 155 to the host 165 without sending a pre-notification to the middlebox element 325 before the migration of the VM 350 .
  • the MSE 370 detects the migration of the VM 350 into the host 165 .
  • the MSE of the destination host detects a new VM being coupled to the MSE and creates a new port to forward packets to and from the new VM.
  • the MSE of the destination host also reports the addition of a new VM to a physical controller that manages the MSE.
  • the physical controller in turn asks the VM migration manager of the source host to fetch the middlebox state related to the migrated VM and send the state to the destination host.
  • a physical controller is a controller responsible for managing a set of MSEs in different hosts. A physical controller will be further described below by reference to FIGS. 7 and 8 .
  • the middlebox element 325 identifies the middlebox state related to the VM 350 (e.g., by using a slice identifier and/or a VM-specific identifier described above) and sends the state to the VM migration manager 335 .
  • the VM migration manager 335 then sends the middlebox state to the VM migration manager 340 of the destination host 165 .
  • the fourth stage 320 shows that the VM migration manager 340 of the host 165 has received the state from the VM migration manager 335 of the host 155 and has sent the middlebox state to the middlebox element 330 of the host 165 .
  • the middlebox element 330 of some embodiments creates a middlebox slice for VM 350 (if there is not a slice of the middlebox element for the logical network that the VM 350 belongs to) and uses the middlebox state received from the VM migration manager 340 to resume the middlebox service to the VM 350 .
  • a middlebox element in a host may need to share middlebox state with the corresponding middlebox elements on the other hosts.
  • Some embodiments include a state sharing manager that facilitates the sharing of middlebox state among middlebox elements in different hosts that implement a middlebox in a distributed manner.
  • the state sharing manager maintains shared middlebox state that is accessible to a middlebox element.
  • the state sharing manager provides a set of application programming interface (API) calls that allow the middlebox element to (1) send middlebox state to the state sharing manager for sharing, (2) get middlebox state that the middlebox element needs from the state sharing manager, (3) remove some state from the state sharing manager so that the state is not shared, and (4) get middlebox state regarding middlebox element configuration.
  • API application programming interface
  • FIG. 4 illustrates an example of such a state sharing mechanism. Specifically, this figure illustrates a state sharing manager that is running in the same host as a middlebox element that implements a middlebox in a distributed manner. This figure illustrates hosts 155 - 170 described above by reference to FIG. 1 . As shown in FIG. 4 , each of the hosts 155 - 170 includes a state sharing manager in addition to an MSE, a middlebox element, and one or more VMs.
  • the state sharing manager in each of the hosts includes middlebox (MB) state for VMs in the hosts 155 - 170 .
  • middlebox middlebox
  • the middlebox element running in each host has sent middlebox state related to the VMs located on the same host as the middlebox element to the state sharing manager running in the host.
  • the middlebox element sends all or only a portion of the middlebox state related to a VM to the state sharing manager.
  • the state sharing managers running in different hosts send state directly to each other so that the middlebox element in one host can get middlebox state from the corresponding middlebox of another host as demanded.
  • the network control system configures a middlebox element in a source host in such a way that the middlebox element uses the state sharing manager and the VM migration manager to send middlebox state related to a VM in the source host to the corresponding middlebox element in a destination host to which the VM migrates.
  • FIG. 5 illustrates an example middlebox state migration from a source host to a destination host as VM is migrating from the source host to the destination host.
  • this figure illustrates in terms of four different stages 505 - 520 that a middlebox element running in a host uses a state sharing manager and a VM migration manager to send state to another middlebox element running in another host.
  • FIG. 5 illustrates that the middlebox elements 525 and 530 in the host 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element.
  • this figure illustrates that the hosts 155 and 165 each have a state sharing manager and a VM migration manager.
  • the middlebox state can be categorized into two types.
  • the first type of state includes information that is useful to more than one non-backup middlebox instance.
  • An example of such type of state is health information of a set of servers or a mapping of a virtual IP address to a list of real IP addresses of a set of servers when the middlebox instances provide a load balancing service.
  • all of the middlebox instances that together provide the load balancing service need the health information.
  • the second type of state includes information that is useful only for a middlebox element in one host.
  • An example of such type of state is a mapping of a source IP address and a real IP address of a server when the middlebox instance is providing a load balancing service. Unless another host is a back-up host running a back-up middlebox instance, this mapping of addresses is not useful for another middlebox instance running in another host because the VM whose IP address is the source IP address does not exist in the other host. Therefore, this type of state usually does not have to be shared by the middlebox instances running in different hosts because other middlebox instances do not need it. This type of state is referred to as “local-only” state.
  • the portion of middlebox state that is of the first type for a particular VM varies.
  • the middlebox instances providing an IDS service have more of the first type of state because the middlebox instances need to monitor network activities in different hosts to detect a possible attack.
  • the middlebox instances providing a load balancing service have mostly local-only state and little of the first type of state that is useful to be shared by the middlebox instances.
  • the middlebox element proactively sends the first type of the middlebox state to the state sharing manager so that different middlebox elements in different hosts can share that type of middlebox state.
  • the VM migration manager 535 of the host 155 pre-notifies the state sharing manager 560 that VM 550 that is currently running in the host 155 is going to be migrated to another host.
  • the network control system configures the state sharing manager running in a host in such a way that the state sharing manager registers for a callback from the VM migration manager in the event of VM migration.
  • the state sharing manager 560 is configured to register for a callback from the VM migration manager 535 and thus the VM migration manager 535 sends a pre-notification to the state sharing manager 560 .
  • the state sharing manager 560 maintains only the first type of middlebox state for the VM 550 located on the same host as the state sharing manager 560 because the middlebox element 525 has proactively sent only the first type of the middlebox state related to the VM 550 .
  • the state sharing manager asks for the rest of the middlebox state related to the VM 550 . That is, the state sharing manager asks for the local-only state in order to have a complete middlebox state for the VM 550 .
  • the middlebox element 525 is the type of middlebox that shares all or most of the state, there is nothing or not much more state to ask for from the middlebox element 525 .
  • the middlebox element 525 identifies the middlebox state that is local-only state related to the VM 550 in order to fulfill the request from the state sharing manager 560 .
  • the middlebox element of some embodiments uses the slice identifier and/or the VM-specific identifier to identify the middlebox state related to the VM in the middlebox element.
  • the middlebox element gathers the state for the VM from the slice that includes the state.
  • the middlebox element of some embodiments sends the gathered local-only state for the VM to the state sharing manager by e.g., using one of the API calls that the state sharing manager supports. In some embodiments, the state sharing manager does not share the local-only state with other state sharing managers in other hosts. In some embodiments, the state sharing manager sends the local-only state to the VM migration manager. In other embodiments, the middlebox element directly sends the local-only middlebox state to the VM migration manager. Regardless of whether the middlebox element or the state sharing manager sends the local-only state to the VM migration manager, the VM migration manager of some embodiments is responsible for sending only the local-only state to the destination host in these embodiments.
  • the middlebox element identifies local-only changes and sends these changes to the state to the VM migration manager directly or via the state sharing manager.
  • the middlebox element identifies changes to the first type of state and sends this to the state sharing manager so that the state sharing manager shares changes to the first type of state with other state sharing managers in other hosts.
  • the middlebox element sends out the updates to the states until the VM migration manager stuns the VM to move the VM to the destination host.
  • the third stage 515 shows that the VM migration manager 515 has stunned the VM 550 and is sending the local-only middlebox state of the VM 550 and the VM 550 (e.g., the VM's state) to the host 165 , which is the destination host to which the VM 550 is migrating in this example.
  • the VM migration manager of the source host sends the middlebox state and the VM state to the VM migration manager of the destination host.
  • the VM migration manager at the destination host provisions the migrating VM in the destination host.
  • the VM migration manager at the destination host provides the middlebox state to the state sharing manager running in the destination host or to the middlebox element running in the destination host.
  • the fourth stage 520 shows that the VM migration manager 540 of the host 165 has received the local-only state from the VM migration manager 535 of the host 155 and has sent the middlebox state to the state sharing manager 565 of the host 165 .
  • the state sharing manager 565 then signals the middlebox element 530 of the host 165 that middlebox state for a new slice for the VM 550 have arrived.
  • the middlebox element 530 then obtains the local-only middlebox state related to the migrated VM 550 from the state sharing manager 565 by, e.g., making an API call that the state sharing manager supports.
  • the middlebox element 530 may get the local-only middlebox state from the VM migration manager 540 directly.
  • the middlebox 530 of some embodiments gets the first type of middlebox state through the state sharing manager 565 .
  • the middlebox element 530 of some embodiments creates a middlebox slice for VM 550 (if there is not a slice of the middlebox element for the logical network that the VM 550 belongs to) and uses the middlebox state to resume the middlebox service to the VM 550 .
  • the middlebox element 530 of some embodiments then sends an acknowledgement to the state sharing manager 565 .
  • the state sharing manager 565 in some embodiments sends an acknowledgement to the VM migration manager 540 .
  • the middlebox element 530 sends the acknowledgement directly to the VM migration manager.
  • the VM migration manager 540 starts the VM 550 in the host 165 .
  • the fourth stage 520 also shows that the VM 550 is not in the host 155 and the middlebox element 525 does not have the middlebox state for the VM 550 .
  • the middlebox element of the source host explicitly deletes the middlebox state related to the VM migrated out of the source host.
  • the middlebox element of the source host lets the middlebox state of the migrated VM expire (e.g., by garbage-collecting the middlebox state that has an expired time to live (TTL)).
  • TTL time to live
  • the state sharing manager 560 of the source host 155 may keep the shared middlebox state, which the middlebox element 525 had proactively shared at the first stage 505 , in the host 155 so that middlebox element 525 can get and use the state for other VMs (not shown) running in the host 155 .
  • FIG. 6 illustrates in four stages 605 - 620 an example middlebox state migration from a source host to a destination host after VM has migrated from the source host to the destination host.
  • the middlebox element running in the source host uses a state sharing manager and a VM migration manager to send state to another middlebox element running in another host.
  • the VM migration manager in this example does not send a pre-notification for imminent VM migration to the middlebox element or the state sharing manager.
  • FIG. 6 illustrates that the middlebox elements 625 and 630 in the hosts 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element.
  • this figure illustrates that the hosts 155 and 165 each have a state sharing manager and a VM migration manager.
  • the state sharing manager 660 has been maintaining the middlebox state for the VM 650 .
  • the middlebox element proactively sends the first type of middlebox state to the state sharing manager.
  • the middlebox element 625 has sent only the first type of the middlebox state related to the VM 650 .
  • the first stage 605 also shows that the VM migration manager 635 of the host 155 has migrated VM 650 from the host 155 to the host 165 without sending a pre-notification to the state sharing manager 660 or the middlebox element 625 before the migration of the VM 650 .
  • the MSE 670 detects the migration of the VM 650 into the host 165 .
  • the MSE of the destination host detects a new VM being coupled to the MSE and creates a new port to forward packets to and from the new VM.
  • the MSE of the destination host also reports the addition of a new VM to a physical controller that manages the MSE.
  • the physical controller in turn asks the VM migration manager of the source host to fetch the middlebox state related to the migrated VM and send the state to the destination host.
  • the MSE 670 reports the addition of the VM 650 to the physical controller 675 .
  • the physical controller 675 then asks the VM migration manager 635 of the host 155 to gather the middlebox state related to the VM 650 .
  • the VM migration manager 635 of some embodiments then asks the state sharing manager 660 to provide the middlebox state for the VM 650 .
  • the state sharing manager 660 gathers the middlebox state that the VM migration manager 635 asked for in the previous stage 610 .
  • the middlebox element proactively sends only the first type of the middlebox state to the state sharing manager.
  • the state sharing manager 660 shares the first type of the middlebox state with the state sharing manager 665 of the host 165 .
  • the VM migration manager 635 receives the local-only middlebox state of the VM 650 from the middlebox element 625 directly or via the state sharing manager 660 .
  • the VM migration manager 635 then sends the middlebox state to the VM migration manager 640 of the destination host 165 as shown in the stage 615 .
  • the fourth stage 620 shows that the VM migration manager 640 of the host 165 has received the state from the VM migration manager 635 of the host 155 and has sent the middlebox state to the middlebox element 630 directly or via the state sharing manager 665 of the host 165 .
  • the VM migration signals the middlebox element 630 of the host 165 (either directly or via the state sharing manager 665 ) that middlebox state for a new slice for the VM 650 has arrived.
  • the middlebox element 630 then obtains all the middlebox state related to the migrated VM 650 from the state sharing manager 665 by, e.g., making an API call that the state sharing manager supports.
  • the middlebox element 630 of some embodiments creates a middlebox slice for VM 650 (if there is not a slice of the middlebox element for the logical network that the VM 650 belongs to) and uses the middlebox state to resume the middlebox service to the VM 650 .
  • the middleboxes may be provisioned through a network control system that is also used to provision the MSEs that implement the logical forwarding elements of the network.
  • the network control system is a hierarchical set of network controllers.
  • FIG. 7 illustrates a network control system 700 of some embodiments for configuring MSEs and distributed middlebox elements in order to implement logical networks.
  • the network control system 700 includes an input translation controller 705 , a logical controller 710 , physical controllers 715 and 720 , and hosts 725 - 740 .
  • the hosts 725 - 740 include both MSE and middlebox elements, which may be implemented as shown above in FIG. 5 .
  • MSE and middlebox elements which may be implemented as shown above in FIG. 5 .
  • One of ordinary skill in the art will recognize that many other different combinations of the various controllers and hosts are possible for the network control system 700 .
  • each of the controllers in a network control system has the capability to function as an input translation controller, logical controller, and/or physical controller.
  • a given controller may only have the functionality to operate as a particular type of controller (e.g., as a physical controller).
  • different combinations of controllers may run in the same physical machine. For instance, the input translation controller 705 and the logical controller 710 may run in the same computing device, with which a user interacts.
  • the input translation controller 705 of some embodiments includes an input translation application that translates network configuration information received from a user.
  • a user may specify a network topology such as that shown in FIG. 1 , which includes a specification as to which machines belong in which logical domain. This effectively specifies a logical datapath set, or a set of logical forwarding elements.
  • the user specifies the machines that connect to the logical switch (i.e., to which logical ports are assigned for the logical switch).
  • the user also specifies IP addresses for the machines.
  • the input translation controller 705 translates the entered network topology into logical control plane data that describes the network topology. For example, an entry might state that a particular MAC address A is located at a particular logical port N of a particular logical switch.
  • each logical network is governed by a particular logical controller (e.g., logical controller 710 ).
  • the logical controller 710 of some embodiments translates the logical control plane data into LFP data, and the LFP data into UPCP data.
  • LFP data in some embodiments, consists of flow entries described at a logical level. For the MAC address A at logical port N, LFP data might include a flow entry specifying that if the destination of a packet matches MAC A, forward the packet to port N.
  • the UPCP data of some embodiments is a data plane that enables the control system of some embodiments to scale even when it contains a large number of MSEs (e.g., thousands) to implement a logical datapath set.
  • the UPCP abstracts common characteristics of different MSEs in order to express physical control plane data without considering differences in the MSEs and/or location specifics of the MSEs.
  • the logical controller 710 of some embodiments translates logical control plane data into LFP data (e.g., logical flow entries), then translates the LFP data into UPCP data.
  • the logical controller application stack includes a control application for performing the first translation and a virtualization application for performing the second translation. Both of these applications, in some embodiments, use a rules engine for mapping a first set of tables into a second set of tables. That is, the different data planes are represented as tables, and the controller applications use a table mapping engine to translate between the data planes.
  • Each of the physical controllers 715 and 720 is a master of one or more MSEs (e.g., located within host machines).
  • each of the two physical controllers are masters of two MSEs each.
  • a physical controller receives the UPCP information for a logical network and translates this data into CPCP information for the particular MSEs that the physical controller manages.
  • the physical controller passes the appropriate UPCP data to the MSE, which includes the ability (e.g., in the form of a chassis controller running on the host machine) to perform the conversion itself.
  • the UPCP to CPCP translation involves a customization of various data in the flow entries.
  • the UPCP would involve several flow entries.
  • the first entry states that if a packet matches the particular logical datapath set (e.g., based on the packet being received at a particular logical ingress port), and the destination address matches MAC A, then forward the packet to logical port N.
  • This flow entry will be the same in the universal and CPCPs, in some embodiments.
  • Additional flows are generated to match a physical ingress port (e.g., a virtual interface of the host machine) to the logical ingress port N (for packets received from MAC A), as well as to match logical port N to the particular egress port of the physical MSE.
  • these physical ingress and egress ports are specific to the host machine containing the MSE.
  • the UPCP entries include abstract physical ports while the CPCP entries include the actual physical ports involved.
  • the network control system also disseminates data relating to the middleboxes of a logical network.
  • the network control system may disseminate middlebox configuration data, data relating to the sending and receiving of packets to/from the middlebox elements at the MSEs and to/from the MSEs at the middleboxes, and data relating to the middlebox elements' interactions with the VM migration managers.
  • the same network control system distributes data to distributed middleboxes in some embodiments.
  • Several physical controllers are used to disseminate the configuration of a distributed middlebox.
  • both the physical controllers 715 and 720 are assigned to disseminate the configuration for the distributed middlebox.
  • the flow entries propagated through the network control system to the MSEs will include entries for sending the appropriate packets to the appropriate middleboxes (e.g., flow entries that specify for packets having a source IP address in a particular subnet to be forwarded to a particular middlebox).
  • the flow entries for the MSE will need to specify how to send such packets to the middleboxes. That is, once a first entry specifies a logical egress port of the logical router to which a particular middlebox is bound, additional entries are required to attach the logical egress port to the middlebox.
  • the packet does not have to actually leave the host machine in order to reach the middlebox.
  • the MSE nevertheless needs to include flow entries for sending the packet to the middlebox element on the host machine.
  • These flow entries again, include an entry to match the logical egress port of the logical router to a port connecting to the middlebox element.
  • the middlebox element attaches to a software abstraction of a port in the MSE.
  • the software abstraction of the port in the MSE is not attached to a port in the MSE.
  • the flow entries in the MSE send packets to this software abstraction in order for the packets to be routed within the host machine to the middlebox element.
  • the MSE adds slicing information to the packet.
  • this slicing information is a tag that indicates to which of the (potentially) several instances being run by the middlebox the packet should be sent.
  • the tag enables the middlebox to use the appropriate set of rules for packet processing, analysis, modification, etc. in order to perform its operations on the packet.
  • FIG. 8 conceptually illustrates the propagation of data through the network control system of some embodiments.
  • the data flow to the MSEs that implement a logical network while the right side of the figure shows the propagation of both middlebox configuration data as well as network attachment and slicing data to the middleboxes.
  • the input translation controller 805 receives a network configuration through an API, which is converted into logical control plane data.
  • This network configuration data includes a logical topology such as that shown in FIG. 1 .
  • the network configuration data of some embodiments includes routing policies that specify which packets are sent to the middlebox.
  • the middlebox is located on a logical wire between two logical forwarding elements (e.g., between a logical router and a logical switch), then all packets sent over that logical wire will automatically be forwarded to the middlebox.
  • the logical router will only send packets to the middlebox when particular policies are specified by the user.
  • routers and switches are normally configured to forward packets according to the destination address (e.g., MAC address or IP address) of the packet
  • policy routing allows forwarding decisions to be made based on other information stored by the packet (e.g., source addresses, a combination of source and destination addresses, etc.). For example, the user might specify that all packets with source IP addresses in a particular subnet or that have destination IP addresses not matching a particular set of subnets, should be forwarded to the middlebox.
  • the logical control plane data is converted by the logical controller 810 (specifically, by the control application of the logical controller) to LFP data, and then subsequently (by the virtualization application of the logical controller) to UPCP data.
  • these conversions generate a flow entry (at the LFP), then adds a match over the logical datapath set (at the UPCP).
  • the UPCP also includes additional flow entries for mapping generic physical ingress ports (i.e., a generic abstraction of a port not specific to any particular physical host machine) to logical ingress ports as well as for mapping logical egress ports to generic physical egress ports.
  • the physical controller 815 (one of the several physical controllers), as shown, translates the UPCP data into CPCP data for the particular MSEs that it manages. This conversion involves substituting specific data (e.g., specific physical ports) for the generic abstractions in the UPCP data.
  • specific data e.g., specific physical ports
  • the port integration entries are configured to specify the physical layer port appropriate for the particular middlebox configuration. This port might be a virtual NIC if the middlebox element runs as a virtual machine on the host machine, or the previously-described software port abstraction within the MSE when the middlebox element runs as a process (e.g., daemon) within the hypervisor on the virtual machine.
  • the port is an IPC channel or TUN/TAP device-like interface.
  • the MSE includes one specific port abstraction for the middlebox element and sends this information to the physical controller in order for the physical controller to customize the physical control plane flows.
  • the physical controller adds flow entries specifying slicing information particular to the middlebox. For instance, for a particular MSE, the flow entry may specify to add a particular tag (e.g., a VLAN tag or similar tag) to a packet before sending the packet to the particular middlebox element.
  • a particular tag e.g., a VLAN tag or similar tag
  • This slicing information enables the middlebox element to receive the packet and identify which of its several independent instances should process the packet.
  • the MSE 725 (one of several MSEs managed by the physical controller 715 ) performs a translation of the CPCP data into physical forwarding plane data.
  • the physical forwarding plane data in some embodiments, are the flow entries stored within a switching element (either a physical router or switch or a software switching element) against which the switching element actually matches received packets.
  • the right side of FIG. 8 illustrates two sets of data propagated to a distributed middlebox rather than the MSEs.
  • the first of these sets of data is the actual middlebox configuration data, that includes various rules specifying the operation of the particular logical middlebox.
  • This data may be received at the input translation controller 805 or a different input interface, through an API particular to the middlebox implementation.
  • different middlebox implementations will have different interfaces presented to the user (i.e., the user will have to enter information in different formats for different particular middleboxes).
  • the user enters a middlebox configuration, which is translated by the middlebox API into middlebox configuration data.
  • the middlebox configuration data is a set of records, with each record specifying a particular rule. These records, in some embodiments, are in a similar format to the flow entries propagated to the MSEs. In fact, some embodiments use the same applications on the controllers to propagate the middlebox configuration records as for the flow entries, and the same table mapping language (e.g., nLog) for the records.
  • nLog table mapping language
  • the middlebox configuration data in some embodiments, is not translated by the logical or physical controller, while in other embodiments the logical and/or physical controller perform at least a minimal translation of the middlebox configuration data records.
  • the middlebox configuration does not require translation from logical to physical data planes.
  • the same middlebox configuration data is passed from the input translation controller 805 (or other interface), to the logical controller 810 , to the physical controller 815 .
  • the logical controller 810 stores a description of the logical network and of the physical implementation of that physical network.
  • the logical controller receives the one or more middlebox configuration records for a distributed middlebox, and identifies which of the various nodes (i.e., host machines) will need to receive the configuration information.
  • the entire middlebox configuration is distributed to middlebox elements at all of the host machines, so the logical controller identifies all of the machines on which at least one virtual machine resides whose packets require use of the middlebox.
  • the identified machines are the hosts for all of the virtual machines in a network (e.g., as for the middlebox shown in FIG. 1 ).
  • some embodiments may identify a subset of the virtual machines in the network if the network topology is such that the middlebox will never be needed at certain host machines. Some embodiments make decisions about which host machines to send the configuration data to on a per-record basis. That is, each particular rule may apply only to a subset of the virtual machines (e.g., only packets originating from a particular virtual machine or subset of virtual machines), and only hosts running these virtual machines need to receive the record.
  • the logical controller identifies the particular physical controllers that manage these particular nodes. As mentioned, each host machine has an assigned master physical controller. Thus, if the logical controller identifies only first and second hosts as destinations for the configuration data, the physical controllers for these hosts will be identified to receive the data from the logical controller (and other physical controllers will not receive this data).
  • the logical controller of some embodiments pushes the data (using an export module that accesses the output of the table mapping engine in the logical controller) to the physical controllers.
  • the physical controllers request configuration data (e.g., in response to a signal that the configuration data is available) from the export module of the logical controller.
  • the physical controllers pass the data to the middlebox elements on the host machines that they manage, much as they pass the physical control plane data.
  • the middlebox configuration and the physical control plane data are sent to the same database running on the host machine, and the MSE and middlebox element retrieve the appropriate information from the database.
  • the middlebox translates the configuration data.
  • the middlebox configuration data will be received in a particular language to express the rules for packet processing, analysis, modification, etc.
  • the middlebox of some embodiments compiles these rules into more optimized packet classification rules. In some embodiments, this transformation is similar to the physical control plane to physical forwarding plane data translation.
  • the middlebox applies the compiled optimized rules in order to efficiently and quickly perform its operations on the packet.
  • the middlebox elements receive slicing and/or attachment information in order to receive packets from and send packets to the MSEs. This information corresponds to the information sent to the MSEs. As shown, in some embodiments the physical controller 815 generates the slicing and/or attachment information for the middlebox (i.e., this information is not generated at the input or logical controller level of the network control system).
  • the physical controllers receive information about the software port of the MSE to which the middlebox element connects from the MSE itself, then passes this information down to the middlebox element. In other embodiments, however, the use of this port is contracted directly between the middlebox element and the MSE within the host machine, so that the middlebox element does not need to receive the attachment information from the physical controller. In some such embodiments, the MSE nevertheless transmits this information to the physical controller in order for the physical controller to customize the UPCP flow entries for receiving packets from and sending packets to the middlebox element.
  • the slicing information generated by the physical controller in some embodiments, consists of an identifier for the middlebox instance to be used for the particular logical network.
  • the middlebox is virtualized for use by multiple logical networks.
  • the middlebox receives a packet from the MSE, in some embodiments the packet includes a prepended tag (e.g., similar to a VLAN tag) that identifies a particular one of the middlebox instances (i.e., a particular configured set of rules) to use in processing the packet.
  • the middlebox translates this slicing information into an internal slice binding.
  • the middlebox uses its own internal identifiers (different from the tags prepended to the packets) in order to identify state (e.g., active TCP connections, statistics about various IP addresses, etc.) within the middlebox.
  • state e.g., active TCP connections, statistics about various IP addresses, etc.
  • some embodiments Upon receiving an instruction to create a new middlebox instance and an external identifier (that is used on the packets) for the new instance, some embodiments automatically create the new middlebox instance and assign the instance an internal identifier.
  • the middlebox stores a binding for the instance that maps the external slice identifier to the internal slice identifier.
  • each of the controllers illustrated in FIG. 8 is shown as a single controller. However, each of these controllers may actually be a controller cluster that operates in a distributed fashion to perform the processing of a logical controller, physical controller, or input translation controller.
  • FIG. 9 illustrates an example architecture of a network controller (e.g., a logical controller or a physical controller) 900 .
  • the network controller of some embodiments uses a table mapping engine to map data from an input set of tables to data in an output set of tables.
  • the input set of tables in a controller includes LCP data to be mapped to logical LFP data, LFP data to be mapped to UPCP data, and/or UPCP data to be mapped to CPCP data.
  • the input set of tables may also include middlebox configuration data to be sent to another controller and/or a distributed middlebox instance.
  • the network controller 900 includes input tables 915 , a rules engine 910 , output tables 920 , an importer 930 , an exporter 925 , a translator 935 , and a persistent data storage (PTD) 940 .
  • input tables 915 a rules engine 910 , output tables 920 , an importer 930 , an exporter 925 , a translator 935 , and a persistent data storage (PTD) 940 .
  • PTD persistent data storage
  • the input tables 915 include tables with different types of data depending on the role of the controller 900 in the network control system. For instance, when the controller 900 functions as a logical controller for a user's logical forwarding elements, the input tables 915 include LCP data and LFP data for the logical forwarding elements. When the controller 900 functions as a physical controller, the input tables 915 include LFP data.
  • the input tables 915 also include middlebox configuration data received from the user or another controller. The middlebox configuration data is associated with a logical datapath set parameter that identifies the logical switching elements to which the middlebox to be is integrated.
  • the control application 900 includes other miscellaneous tables (not shown) that the rules engine 910 uses to gather inputs for its table mapping operations.
  • These miscellaneous tables include constant tables that store defined values for constants that the rules engine 910 needs to perform its table mapping operations (e.g., the value 0 , a dispatch port number for resubmits, etc.).
  • the miscellaneous tables further include function tables that store functions that the rules engine 910 uses to calculate values to populate the output tables 920 .
  • the rules engine 910 performs table mapping operations that specify one manner for converting input data to output data. Whenever one of the input tables is modified (referred to as an input table event), the rules engine performs a set of table mapping operations that may result in the modification of one or more data tuples in one or more output tables.
  • the rules engine 910 includes an event processor (not shown), several query plans (not shown), and a table processor (not shown).
  • Each query plan is a set of rules that specifies a set of join operations that are to be performed upon the occurrence of an input table event.
  • the event processor of the rules engine 910 detects the occurrence of each such event.
  • the event processor registers for callbacks with the input tables for notification of changes to the records in the input tables 915 , and detects an input table event by receiving a notification from an input table when one of its records has changed.
  • the event processor In response to a detected input table event, the event processor (1) selects an appropriate query plan for the detected table event, and (2) directs the table processor to execute the query plan.
  • the table processor In some embodiments, performs the join operations specified by the query plan to produce one or more records that represent one or more sets of data values from one or more input and miscellaneous tables.
  • the table processor of some embodiments then (1) performs a select operation to select a subset of the data values from the record(s) produced by the join operations, and (2) writes the selected subset of data values in one or more output tables 920 .
  • nLog uses a variation of the Datalog database language to allow application developers to create the rules engine for the controller, and thereby to specify the manner by which the controller maps logical datapath sets to the controlled physical switching infrastructure.
  • This variation of the Dartalog database language is referred to herein as nLog.
  • nLog provides a few declaratory rules and operators that allow a developer to specify different operations that are to be performed upon the occurrence of different events.
  • nLog provides a limited subset of the operators that are provided by Datalog in order to increase the operational speed of nLog. For instance, in some embodiments, nLog only allows the AND operator to be used in any of the declaratory rules.
  • nLog engine The declaratory rules and operations that are specified through nLog are then compiled into a much larger set of rules by an nLog compiler.
  • this compiler translates each rule that is meant to address an event into several sets of database join operations.
  • Collectively the larger set of rules forms the table mapping rules engine that is referred to as the nLog engine.
  • Some embodiments designate the first join operation that is performed by the rules engine for an input event to be based on the logical datapath set parameter. This designation ensures that the rules engine's join operations fail and terminate immediately when the rules engine has started a set of join operations that relate to a logical datapath set (i.e., to a logical network) that is not managed by the controller.
  • the output tables 920 include tables with different types of data depending on the role of the controller 900 .
  • the output tables 915 include LFP data and UPCP data for the logical switching elements.
  • the output tables 920 include CPCP data.
  • the output tables 920 may also include the middlebox configuration data.
  • the output tables 920 may include a slice identifier when the controller 900 functions as a physical controller.
  • the output tables 920 can be grouped into several different categories.
  • the output tables 920 can be rules engine (RE) input tables and/or RE output tables.
  • An output table is a RE input table when a change in the output table causes the rules engine to detect an input event that requires the execution of a query plan.
  • An output table can also be an RE input table that generates an event that causes the rules engine to perform another query plan.
  • An output table is a RE output table when a change in the output table causes the exporter 925 to export the change to another controller or a MSE.
  • An output table can be an RE input table, a RE output table, or both an RE input table and a RE output table.
  • the exporter 925 detects changes to the RE output tables of the output tables 920 .
  • the exporter registers for callbacks with the RE output tables for notification of changes to the records of the RE output tables.
  • the exporter 925 detects an output table event when it receives notification from a RE output table that one of its records has changed.
  • the exporter 925 takes each modified data tuple in the modified RE output tables and propagates this modified data tuple to one or more other controllers or to one or more MSEs.
  • the exporter uses a single channel of communication (e.g., a RPC channel) to send the data contained in the records.
  • the exporter uses two channels. One channel is established using a switch control protocol (e.g., OpenFlow) for writing flow entries in the control plane of the MSE.
  • the other channel is established using a database communication protocol (e.g., JSON) to send configuration data (e.g., port configuration, tunnel information).
  • the controller 900 does not keep in the output tables 920 the data for logical datapath sets that the controller is not responsible for managing (i.e., for logical networks managed by other logical controllers). However, such data is translated by the translator 935 into a format that can be stored in the PTD 940 and is then stored in the PTD. The PTD 940 propagates this data to PTDs of one or more other controllers so that those other controllers that are responsible for managing the logical datapath sets can process the data.
  • the controller also brings the data stored in the output tables 920 to the PTD for resiliency of the data. Therefore, in these embodiments, a PTD of a controller has all the configuration data for all logical datapath sets managed by the network control system. That is, each PTD contains the global view of the configuration of the logical networks of all users.
  • the importer 930 interfaces with a number of different sources of input data and uses the input data to modify or create the input tables 915 .
  • the importer 930 of some embodiments receives the input data from another controller.
  • the importer 930 also interfaces with the PTD 940 so that data received through the PTD from other controller instances can be translated and used as input data to modify or create the input tables 915 .
  • the importer 930 also detects changes with the RE input tables in the output tables 920 .
  • Computer readable storage medium also referred to as computer readable medium.
  • processing unit(s) e.g., one or more processors, cores of processors, or other processing units
  • processing unit(s) e.g., one or more processors, cores of processors, or other processing units
  • Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc.
  • the computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
  • the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage which can be read into memory for processing by a processor.
  • multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions.
  • multiple software inventions can also be implemented as separate programs.
  • any combination of separate programs that together implement a software invention described here is within the scope of the invention.
  • the software programs when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
  • FIG. 10 conceptually illustrates an electronica computer system 1000 with which some embodiments of the invention are implemented.
  • the electronic system 1000 may be a computer, server, dedicated switch, phone, or any other sort of electronic device.
  • Such an electronic system includes various types of computer readable media and interfaces for various other types of computer readable media.
  • Electronic system 1000 includes a bus 1005 , processing unit(s) 1010 , a system memory 1025 , a read-only memory 1030 , a permanent storage device 1035 , input devices 1040 , and output devices 1045 .
  • the bus 1005 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the electronic system 1000 .
  • the bus 1005 communicatively connects the processing unit(s) 1010 with the read-only memory 1030 , the system memory 1025 , and the permanent storage device 1035 .
  • the processing unit(s) 1010 retrieve instructions to execute and data to process in order to execute the processes of the invention.
  • the processing unit(s) may be a single processor or a multi-core processor in different embodiments.
  • the read-only-memory (ROM) 1030 stores static data and instructions that are needed by the processing unit(s) 1010 and other modules of the electronic system.
  • the permanent storage device 1035 is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the electronic system 1000 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1035 .
  • the system memory 1025 is a read-and-write memory device. However, unlike storage device 1035 , the system memory is a volatile read-and-write memory, such a random access memory.
  • the system memory stores some of the instructions and data that the processor needs at runtime.
  • the invention's processes are stored in the system memory 1025 , the permanent storage device 1035 , and/or the read-only memory 1030 . From these various memory units, the processing unit(s) 1010 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
  • the bus 1005 also connects to the input and output devices 1040 and 1045 .
  • the input devices enable the user to communicate information and select commands to the electronic system.
  • the input devices 1040 include alphanumeric keyboards and pointing devices (also called “cursor control devices”).
  • the output devices 1045 display images generated by the electronic system.
  • the output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
  • bus 1005 also couples electronic system 1000 to a network 1065 through a network adapter (not shown).
  • the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of electronic system 1000 may be used in conjunction with the invention.
  • Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra density optical discs, any other optical or magnetic media, and floppy disks.
  • CD-ROM compact discs
  • CD-R recordable compact discs
  • the computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
  • Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
  • ASICs application specific integrated circuits
  • FPGAs field programmable gate arrays
  • integrated circuits execute instructions that are stored on the circuit itself.
  • the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
  • display or displaying means displaying on an electronic device.
  • computer readable medium and “computer readable media” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.

Abstract

A controller of a network control system for configuring several middlebox instances is described. The middlebox instances implement a middlebox in a distributed manner in several hosts. The controller configures, in a first host, a first middlebox instance to receive a notification from a migration module before a virtual machine (VM) running in the first host migrates to a second host and to send middlebox state related to the VM to the migration module.

Description

CLAIM OF BENEFIT TO PRIOR APPLICATION
This application claims the benefit of U.S. Provisional Application 61/560,279, entitled “Virtual Middlebox Services”, filed Nov. 15, 2011.U.S. Application 61/560,279 is incorporated herein by reference.
BACKGROUND
Many current enterprises have large and sophisticated networks comprising switches, hubs, routers, middleboxes, servers, workstations and other networked devices, which support a variety of connections, applications and systems. The increased sophistication of computer networking, including virtual machine migration, dynamic workloads, multi-tenancy, and customer-specific quality of service and security configurations require a better paradigm for network control. Networks have traditionally been managed through low-level configuration of individual network components. Network configurations often depend on the underlying network: for example, blocking a user's access with an access control list (“ACL”) entry requires knowing the user's current IP address. More complicated tasks require more extensive network knowledge: for example, forcing guest users' port 80 traffic to traverse an HTTP proxy requires knowing the current network topology and the location of each guest. This process is of increased difficulty where the network switching elements are shared across multiple users.
In response, there is a growing movement towards a new network control paradigm called Software-Defined Networking (SDN). In the SDN paradigm, a network controller, running on one or more servers in a network, controls, maintains, and implements control logic that governs the forwarding behavior of shared network switching elements on a per user basis. Making network management decisions often requires knowledge of the network state. To facilitate management decision-making, the network controller creates and maintains a view of the network state and provides an application programming interface upon which management applications may access a view of the network state.
Some of the primary goals of maintaining large networks (including both datacenters and enterprise networks) are scalability, mobility, and multi-tenancy. Many approaches taken to address one of these goals result in hampering at least one of the others. For instance, one can easily provide network mobility for virtual machines within an L2 domain, but L2 domains cannot scale to large sizes. Furthermore, retaining user isolation greatly complicates mobility. As such, improved solutions that can satisfy the scalability, mobility, and multi-tenancy goals are needed.
BRIEF SUMMARY
Some embodiments of the invention provide a network control system that allows a user to specify a logical network that includes one or more logical forwarding elements (e.g., logical switches, logical routers, etc.) and one or more middleboxes (e.g., firewalls, load balancers, network address translators, intrusion detection systems (IDS), wide area network (WAN) optimizers, etc.). The system implements the user-specified logical forwarding elements across numerous managed switching elements on numerous physical machines that also host virtual machines of the logical network. The system implements the user-specified middleboxes across the numerous physical machines. Typically, the system of some embodiments configures, in one host machine, a managed switching element that implements at least part of the logical switching elements, a distributed middlebox instance that provides a middlebox service to the packets forwarded by the managed switching element, and one or more virtual machines (VMs).
When a VM migrates from a source host to a destination host, the distributed middlebox instance of some embodiments, running in the source host, sends the state information related to the VM to the distributed middlebox instance running in the destination host. Using the states, the distributed middlebox instance running in the destination host resumes the middlebox service to the particular VM.
A distributed middlebox instance of different embodiments sends the state information related to the migrating VM to the distributed middlebox instance running in the destination host differently. For instance, in some embodiments, the distributed middlebox instance running in the source host uses a pre-notification sent by a VM migration manager before the VM is migrated. In response to receiving the pre-notification, the distributed middlebox instance running in the source host gathers all middlebox state that is related to the migrating VM and sends the gathered state to the VM migration manager.
The VM continues to operate in the source host and the distributed middlebox instance running in the source host supplies the state updates to the VM migration manager. As the VM migration manager stuns the VM at the source host and migrates the VM to the destination host, the VM migration manager also migrates the middlebox state related to the VM to the destination host. The VM migration manager running in the destination host then provisions the VM at the destination host and sends the middlebox state to the distributed middlebox instance running in the destination host. The distributed middlebox instance running in the destination host resumes the middlebox service to the migrated VM.
In some embodiments, the VM migration manager does not support pre-notification messages. In these embodiments, the distributed middlebox instance running at the source host still uses the VM migration manager to send the middlebox state related to the VM to the destination host. However, the middlebox state migration starts after the VM migrates to the destination host.
In some embodiments, the network control system configures the distributed middlebox instances to interact with the VM migration managers to migrate the middlebox state for migrating VMs. In some embodiments, the network control system configures the distributed middlebox by sending the middlebox configuration data to the distributed middlebox instances. The network control system configures the distributed middlebox in a similar way to how the network control system configures the managed switching elements to perform logical forwarding processing of the logical switching elements of a user.
In some embodiments, the network control system has several controllers including logical controllers and physical controllers. A logical controller is a master of logical switching elements of a user. A logical controller of some embodiments receives specification of the logical switching elements from the user, in the form of logical control plane (LCP) data. The logical controller translates the LCP data into logical forwarding plane (LFP) data, which define the control plane and the forwarding plane of the logical switching elements. The logical controller then translates the LFP data to universal physical control plane (UPCP) data. The logical controller then identifies a set of physical controllers, each of which is responsible for managing a managed switching element. The logical controller sends the UPCP data only to the identified set of physical controllers that manage managed switching elements each of which at least partially implements the logical switching elements of the user.
A physical controller translates the UPCP data into customized physical control plane (CPCP) data, which is control plane data for the managed switching elements that implement the logical switching elements. A physical controller sends the CPCP data to the managed switching element. The managed switching elements then translate the customized control plane to perform the logical forwarding processing of the logical switching elements specified by the user.
Similarly, a logical controller receives configuration data for configuring the middlebox. The logical controller identifies the same set of physical controllers which are masters of the managed switching elements that implement, at least partially, the logical switching elements specified by the user. The logical controller sends the middlebox configuration data to the identified set of physical controllers. The physical controller of some embodiments then sends the middlebox configuration data to the managed switching elements so that the managed switching elements can send the middlebox configuration data to the distributed middlebox instances. Alternatively, the physical controller sends the middlebox configuration data directly to the distributed middlebox instance, which is hosted in the same physical machine as the managed switching elements of which the physical controller is the master.
The preceding Summary is intended to serve as a brief introduction to some embodiments of the invention. It is not meant to be an introduction or overview of all inventive subject matter disclosed in this document. The Detailed Description that follows and the Drawings that are referred to in the Detailed Description will further describe the embodiments described in the Summary as well as other embodiments. Accordingly, to understand all the embodiments described by this document, a full review of the Summary, Detailed Description and the Drawings is needed. Moreover, the claimed subject matters are not to be limited by the illustrative details in the Summary, Detailed Description and the Drawing, but rather are to be defined by the appended claims, because the claimed subject matters can be embodied in other specific forms without departing from the spirit of the subject matters.
BRIEF DESCRIPTION OF THE DRAWINGS
The novel features of the invention are set forth in the appended claims. However, for purposes of explanation, several embodiments of the invention are set forth in the following figures.
FIG. 1 conceptually illustrates a logical network topology of some embodiments that is implemented in a managed network in a distributed fashion.
FIG. 2 illustrates an example middlebox state migration from a source host to a destination host as a VM is migrating from the source host to the destination host.
FIG. 3 illustrates an example middlebox state migration from a source host to a destination host after a VM has migrated from the source host to the destination host.
FIG. 4 illustrates an example of such a state sharing mechanism.
FIG. 5 illustrates an example middlebox state migration from a source host to a destination host as VM is migrating from the source host to the destination host.
FIG. 6 illustrates an example middlebox state migration from a source host to a destination host after VM has migrated from the source host to the destination host.
FIG. 7 illustrates a network control system of some embodiments for configuring MSEs and distributed middlebox elements in order to implement logical networks.
FIG. 8 conceptually illustrates the propagation of data through the network control system of some embodiments.
FIG. 9 illustrates example architecture of a network controller.
FIG. 10 conceptually illustrates an electronic system with which some embodiments of the invention are implemented.
DETAILED DESCRIPTION
In the following detailed description of the invention, numerous details, examples, and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed.
For a middlebox that is implemented in a distributed manner, a distributed middlebox instance of some embodiments that implements the middlebox may provide middlebox service to one or more virtual machines (VM) that are running in the same host as the distributed middlebox instance. When a particular VM migrates from a first host to a second host, the distributed middlebox instance of some embodiments sends the state related to the particular VM to the distributed middlebox instance running in the second host. Using the state, the distributed middlebox instance running in the second host resumes the middlebox service to the particular VM.
Several examples of such distributed middlebox instances are described below in Section I. Section II then describes a network control system. Section III describes an electronic system that implements some embodiments of the invention.
I. Migrating Middlebox State
A. Distributed Middleboxes
FIG. 1 conceptually illustrates a logical network topology 100 of some embodiments that is implemented in a managed network in a distributed fashion. Shown in the top half of the figure, network topology 100 is a simplified network for purposes of explanation. The network includes two logical L2 switches 105 and 110 connected by a logical L3 router 115. The logical switch 105 connects virtual machines 120 and 125, while the logical switch 110 connects virtual machines 130 and 135. The logical router 115 also connects to an external network 145.
In addition, a middlebox 140 attaches to the logical router 115. One of ordinary skill in the art will recognize that the network topology 100 represents just one particular logical network topology into which a middlebox may be incorporated. In various embodiments, the middlebox may be located directly between two other components (e.g., directly between the gateway and logical router in order to monitor and process all traffic entering or exiting the logical network), or in other locations in a more complex network.
In the architecture shown in FIG. 1, the middlebox 140 is not located within the direct traffic flow, either from one domain to the other, or between the external world and the domain. Accordingly, packets will not be sent to the middlebox unless routing policies are specified (e.g., by a user such as a network administrator) for the logical router 115 that determine which packets should be sent to the middlebox for processing. Some embodiments enable the use of policy routing rules, which forward packets based on data beyond the destination address (e.g., destination IP or MAC address). For example, a user might specify (e.g., through a network controller application programming interface (API)) that all packets with a source IP address in the logical subnet switched by logical switch 105 or all packets that enter the network from the external network 195 destined for the logical subnet switched by the logical switch 110, should be directed to the middlebox 140 for processing.
Different middleboxes may perform different functionalities within the network. For instance, a firewall analyzes data packets to determine whether or not the packets should be allowed through (i.e., similar to ACL flow entries). The firewall stores a set of rules (e.g., entered by a user), that determine whether or not the firewall drops (i.e., discards) or allows the packet through (or, in some cases, rejects the packet by dropping the packet and sending an error response back to the sender). In some embodiments, the firewall is a stateful firewall that keeps track of transport (e.g., TCP and/or UDP) connections, and uses the stored state information to allow the packets that belong to an open transport connection to pass through.
Source network address translation (SNAT) modifies the source IP address of packets in the packet headers. For instance, SNAT may be used so that the IP addresses of numerous different machines with different IP addresses can be hidden from destination machines by changing the source of packets from the different machines to a single IP address. Destination network address translation (D-NAT) similarly modifies the destination IP address of packets in order to hide the real IP addresses from the source machines. Load balancing is a form of D-NAT that uses various algorithms (e.g., round robin, random assignment, etc.) to balance traffic across numerous destination machines. A load balancer receives a packet for a specific IP address that is exposed to the source machine and modifies the destination IP address of the packet to match up with a particular one of the destination machines selected by the load balancing algorithm.
An intrusion detection system (IDS) is a passive middlebox in some embodiments that monitors the logical network for malicious activities or policy violations. The IDS may examine transport connections (e.g., TCP connections, UDP connections, etc.) to determine whether an attack on the network is occurring.
A WAN optimizer is a middlebox device for increasing the efficiency of data transfers across a WAN (e.g., accelerating the flow of data across the WAN). Examples of WAN optimization techniques include data deduplication, data compression, latency optimization, caching and/or proxying, forward error correction, protocol spoofing, traffic shaping, equalizing, connection limiting, simple rate limiting, etc. While the above is a list of some of the several different middleboxes, one of ordinary skill in the art will recognize that some embodiments may include various different middleboxes that may be implemented in a distributed manner.
The bottom half of FIG. 1 conceptually illustrates such a distributed implementation 150 of some embodiments. Specifically, the bottom half of this figure illustrates several nodes, including a first host machine 155, a second host machine 160, a third host machine 165, and an Nth host machine 170. Each of the first three nodes hosts several virtual machines of the network 100, with virtual machine 120 hosted on the first host machine 155, virtual machines 125 and 135 hosted on the second host machine 160, and virtual machine 130 hosted on the third host machine 165.
In addition, each of the host machines includes a managed switching element (“MSE”). The managed switching elements of some embodiments are software forwarding elements that implement logical forwarding elements for one or more logical networks. For instance, the MSEs in the hosts 155-170 include flow entries in forwarding tables that implement the logical forwarding elements of the network 100. Specifically, the MSEs on the host machines implement the logical switches 105 and 110, as well as the logical router 115. On the other hand, some embodiments only implement logical switches at a particular node when at least one virtual machine connected to the logical switch is located at the node (i.e., only implementing logical switch 105 and logical router 115 in the MSE at host 155).
The implementation 150 of some embodiments also includes a pool node 195 that connects to the host machines. In some embodiments, the MSEs residing on the host perform first-hop processing. That is, these MSEs are the first forwarding elements a packet reaches after being sent from a virtual machine, and attempt to perform all of the logical switching and routing at this first hop. However, in some cases, a particular MSE may not store flow entries containing all of the logical forwarding information for a network, and therefore may not know what to do with a particular packet. In some such embodiments, the MSE sends the packet to a pool node 195 for further processing. These pool nodes are interior managed switching elements which, in some embodiments, store flow entries that encompass a larger portion of the logical network than the edge software switching elements.
Similar to the distribution of the logical switching elements across the hosts on which the virtual machines of network 100 reside, the middlebox 140 is distributed across middlebox elements on these hosts 155-165. In some embodiments, a middlebox module (or set of modules) resides on the host machines (e.g., operating in the hypervisor of the host, etc.). When the user sets up the logical network (e.g., network 100), the input includes a configuration from the middlebox. For instance, for a firewall, the user would input a set of rules for packet filtering (e.g., based on IP address, TCP connection, etc.). In some embodiments, the network control system that is used to provision the managed switching elements to implement the logical forwarding elements may also be used to provision the various middlebox elements operating on the host machines. When the user inputs the middlebox configuration into a controller of the network control system, the controller identifies the particular nodes over which the middlebox configuration should be implemented, and distributes the configuration to these nodes (e.g., through a set of controllers).
When one of the virtual machines sends a packet (e.g., to another one of the virtual machines, to an external address, etc.), the packet initially goes to the local MSE for processing. The MSE may use its stored flow entries to make a forwarding decision to send the packet to the middlebox, in which case, some embodiments send the packet to the local middlebox element (i.e., a distributed middlebox instance) on the same host. In some embodiments, the middlebox element and the MSE negotiate a software port through which to transfer packets with minimal delay. After the middlebox processes the packet, some embodiments then send the packet back to the MSE through this same port. In some embodiments, this packet is sent from the middlebox to the MSE as a new packet, and therefore requires new processing by the MSE. In some situations, however, no packets are sent back. For instance, if the middlebox is a firewall, the middlebox may block or drop the packet. In addition, some embodiments of the middlebox are passive, and duplicates of the packets are sent to the middlebox in order for the middlebox to keep track of statistics, but are not sent back to the switching element.
While FIG. 1 illustrates only one logical network implemented across the hosts 155-170, some embodiments implement numerous logical networks (e.g., for different users or tenants) across the set of hosts. As such, a middlebox element on a particular host might actually store configurations for several different firewalls belonging to several different logical networks. For example, a firewall element may be virtualized to implement two (or more) different firewalls. These will effectively operate as two separate middlebox instances, such that the middlebox element is sliced into several “virtual” middleboxes (of the same type). In addition, when the MSE on the host sends packets to the middlebox, some embodiments append (e.g., prepend) a slice identifier (or tag) on the packet to identify to which of the several virtual middleboxes the packet is being sent. When multiple middleboxes are implemented on the same middlebox element for a single logical network (e.g., two different load balancers), the slice identifier will need to identify the particular middlebox slice rather than just the logical network to which the packet belongs. Different embodiments may use different slice identifiers for the middleboxes.
In some cases, more than one VM of the same logical network may be running in the same host. In such cases, the slice identifier that identifies a virtual middlebox serving for the logical network may not be sufficient to identify middlebox state for each of the VMs running in the same host. Some embodiments provide a VM-specific identifier for identifying the middlebox state of each of the VMs. In some embodiments, the MSE that forwards packets between these VMs and the virtual middlebox provides the VM-specific identifiers for the VMs. As will be described further below, the VM-specific identifiers are used to extract the state information of a particular VM when the particular VM migrates from one host to another host.
Examples of middleboxes that may be distributed include firewalls, SNATs, and load balancers. In each of these cases, the middlebox plays an active role in the packet processing (i.e., SNATs and load balancers modify source and destination addresses of the packets, respectively, while firewalls make decisions as to whether to allow or drop packets). However, each of these middlebox elements on a particular node can function on its own without requiring information from the corresponding middlebox elements on the other nodes. Even distributed load balancer elements can each separately load balance incoming traffic across different virtual machines with the assumption that none of the virtual machines are likely to become overloaded so long as the other load balancer elements use the same algorithm. Nevertheless, in some embodiments, the load balancer elements will share state (e.g., after querying the destination virtual machines for usage and health statistics) at some level.
B. Middlebox State Migration Using VM Migration Manager
Some types of middleboxes establish state for connections between machines (e.g., between two virtual machines in the network, between a VM in the network and an external machine, etc.). In some embodiments, the middlebox establishes a state for each transport layer connection (e.g., TCP connection, UDP connection). In the distributed case of some embodiments, a middlebox element operating at a particular host machine creates state for the transport connections passing through it, but does not need to share this state with the other middlebox elements operating on the other host machines. When the state only applies to the virtual machines hosted on the particular host machine, and the middlebox does not need to perform any analysis using state information established for other VMs, then the state does not have to be shared. Examples of state information that does not have to be shared among the middlebox elements include the transport connection state (e.g., IP addresses and ports, TCP sequence numbers, etc.), mapping between original and translated addresses and port numbers, timestamps for detecting dead connections, etc.
However, when a VM migrates from a source host to a destination host, the middlebox state related to the VM needs to be brought into the destination host in order for the migrated VM to resume its function at the destination host. For instance, the transport connection state for the migrated VM is needed at the destination host to prevent the transport connections from breaking As mentioned above, a middlebox element providing a middlebox service to a co-hosted VM sends the state related to the VM to another host to which the VM is migrating. FIG. 2 illustrates an example middlebox state migration from a source host to a destination host as a VM is migrating from the source host to the destination host. In particular, this figure illustrates in terms of four different stages 205-220 that a middlebox element running in a host uses a VM migration manager to send state to another middlebox element running in another host.
In some embodiments, a VM migration manager is a software application running in a host that manages migration of a VM into or out of the host. A VM migration manager is part of a hypervisor of the host, which provisions and manages the VMs in the host in some embodiments. In other embodiments, the VM migration manager is a stand-alone software application. VM migration managers running in different hosts cooperate when migrating VMs to and from the different hosts. In some embodiments, a VM migration manager of a host communicates with other software components (e.g., middlebox elements and MSEs) running in the host to gather any state related to a VM that is migrating to another host and sends the gathered state to the other host along with the VM.
This figure illustrates two hosts 155 and 165 described above by reference to FIG. 1. Implementation of the logical forwarding elements of the logical network topology 100 in the MSEs of the hosts 155 and 165 are not depicted for simplicity of illustration. FIG. 2 also illustrates that the middlebox elements 225 and 230 in the hosts 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element. In addition, this figure illustrates that the hosts 155 and 165 each have a VM migration manager.
At the first stage 205, the VM migration manager 235 of the host 155 pre-notifies the middlebox element 225 that VM 1 that is currently running in the host 155 is going to be migrated to another host. In some embodiments, the network control system configures the middlebox element running in a host in such a way that the middlebox registers for a callback from the VM migration manager in the event of VM migration. Configuring a middlebox element will be described in detail further below by reference to FIGS. 7 and 8. In this example, the middlebox element 225 is configured to register for a callback from the VM migration manager 235 and thus the VM migration manager 235 sends a pre-notification to the middlebox element 225.
At the second stage 210, the middlebox element 225 identifies the middlebox state related to the VM 250 and sends the state to the VM migration manager 235. In some embodiments, a VM running in a host is associated with a slice identifier for identifying a particular slice of the middlebox element that performs middlebox service on the packets coming to and from a VM that belongs to a particular logical network. As mentioned above, in some embodiments, this slice identifier is for appending to the packets. In addition, a VM running in a host is associated with a VM-specific identifier when another VM that belongs to the same logical network is running in the same host. As mentioned above, this VM-specific identifier is for identifying the VM-specific middlebox state within the identified slice of the middlebox element. The middlebox element of some embodiments uses the VM-specific identifier and the slice identifier to identify the slice of the middlebox element for the VM and gathers the state for the VM from the identified slice.
The middlebox element of some embodiments sends the gathered state for the VM and sends the state to the VM migration manager. Also, as the VM continues to function in the source host, the state related to the VM may also change. The middlebox element identifies these changes and sends the changes to the VM migration manager until the VM migration manager stuns the VM to move the VM to the destination host.
The third stage 215 shows that the VM migration manager 235 has stunned the VM 250 and is sending the middlebox state of the VM 250 and the VM 250 (e.g., the VM's state) to the host 165, which is the destination host to which the VM 250 is migrating in this example. In some embodiments, the VM migration manager of the source host sends the middlebox state and the VM state to the VM migration manager of the destination host. The VM migration manager at the destination host provisions the migrating VM in the destination host and provides the middlebox state to the middlebox element running in the destination host.
The fourth stage 220 shows that the VM migration manager 240 of the host 165 has received the state from the VM migration manager 235 of the host 155 and has sent the middlebox state to the middlebox element 230 of the host 165. In some embodiments, the network control system configures the middlebox element running in a host in such a way that the middlebox registers for a callback from the VM migration manager in the event of a new VM being provisioned in the host. In this example, the middlebox element 230 is configured to register for such a callback from the VM migration manager 240 and thus the VM migration manager 240 sends a pre-notification to the middlebox element 230. Also, the VM migration manager 240 sends the middlebox state of the migrating VM 250 along with the pre-notification. The VM migration manager 240 also starts the VM 250 in the host 165. The middlebox element 230 of some embodiments creates a middlebox slice for VM 250 (if there is not a slice of the middlebox element for the logical network that the VM 250 belongs to) and uses the middlebox state received from the VM migration manager 240 to resume the middlebox service to the VM 250.
The fourth stage 220 also shows that the VM 250 is not in the host 155 and the middlebox element 225 does not have the middlebox state for the VM 250. In some embodiments, the middlebox element of the source host explicitly deletes the middlebox state related to the VM migrated out of the source host. Alternatively or conjunctively, the middlebox element of the source host lets the middlebox state of the migrated VM expire (e.g., by garbage-collecting the middlebox states that have an expired time to live (TTL)).
FIG. 3 illustrates in four stages 305-320 an example middlebox state migration from a source host to a destination host after a VM has migrated from the source host to the destination host. In this example, the middlebox element running in the source host uses a VM migration manager to send state to another middlebox element running in another host. However, the VM migration manager in this example does not send a pre-notification for imminent VM migration to the middlebox element.
This figure illustrates two hosts 155 and 165 described above by reference to FIG. 1. Implementation of the logical forwarding elements of the logical network topology 100 in the MSEs of the hosts 155 and 165 are not depicted for simplicity of illustration. FIG. 3 also illustrates that the middlebox elements 325 and 330 in the hosts 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element. In addition, this figure illustrates that the hosts 155 and 165 each have a VM migration manager.
The first stage 305 also shows that the VM migration manager 335 of the host 155 has migrated VM 350 from the host 155 to the host 165 without sending a pre-notification to the middlebox element 325 before the migration of the VM 350.
At the second stage 310, the MSE 370 detects the migration of the VM 350 into the host 165. In some embodiments, the MSE of the destination host detects a new VM being coupled to the MSE and creates a new port to forward packets to and from the new VM. The MSE of the destination host also reports the addition of a new VM to a physical controller that manages the MSE. The physical controller in turn asks the VM migration manager of the source host to fetch the middlebox state related to the migrated VM and send the state to the destination host. In some embodiments, a physical controller is a controller responsible for managing a set of MSEs in different hosts. A physical controller will be further described below by reference to FIGS. 7 and 8.
At the third stage 315, the middlebox element 325 identifies the middlebox state related to the VM 350 (e.g., by using a slice identifier and/or a VM-specific identifier described above) and sends the state to the VM migration manager 335. The VM migration manager 335 then sends the middlebox state to the VM migration manager 340 of the destination host 165.
The fourth stage 320 shows that the VM migration manager 340 of the host 165 has received the state from the VM migration manager 335 of the host 155 and has sent the middlebox state to the middlebox element 330 of the host 165. The middlebox element 330 of some embodiments creates a middlebox slice for VM 350 (if there is not a slice of the middlebox element for the logical network that the VM 350 belongs to) and uses the middlebox state received from the VM migration manager 340 to resume the middlebox service to the VM 350.
C. Middlebox State Migration Using State Sharing Manager
As mentioned above, a middlebox element in a host may need to share middlebox state with the corresponding middlebox elements on the other hosts. Some embodiments include a state sharing manager that facilitates the sharing of middlebox state among middlebox elements in different hosts that implement a middlebox in a distributed manner. In particular, the state sharing manager maintains shared middlebox state that is accessible to a middlebox element. In some embodiments, the state sharing manager provides a set of application programming interface (API) calls that allow the middlebox element to (1) send middlebox state to the state sharing manager for sharing, (2) get middlebox state that the middlebox element needs from the state sharing manager, (3) remove some state from the state sharing manager so that the state is not shared, and (4) get middlebox state regarding middlebox element configuration.
FIG. 4 illustrates an example of such a state sharing mechanism. Specifically, this figure illustrates a state sharing manager that is running in the same host as a middlebox element that implements a middlebox in a distributed manner. This figure illustrates hosts 155-170 described above by reference to FIG. 1. As shown in FIG. 4, each of the hosts 155-170 includes a state sharing manager in addition to an MSE, a middlebox element, and one or more VMs.
As shown, the state sharing manager in each of the hosts includes middlebox (MB) state for VMs in the hosts 155-170. This is because the middlebox element running in each host has sent middlebox state related to the VMs located on the same host as the middlebox element to the state sharing manager running in the host. Depending on the type of middlebox that these middlebox elements implement in a distributed manner, the middlebox element sends all or only a portion of the middlebox state related to a VM to the state sharing manager. In some embodiments, the state sharing managers running in different hosts send state directly to each other so that the middlebox element in one host can get middlebox state from the corresponding middlebox of another host as demanded.
In some embodiments, the network control system configures a middlebox element in a source host in such a way that the middlebox element uses the state sharing manager and the VM migration manager to send middlebox state related to a VM in the source host to the corresponding middlebox element in a destination host to which the VM migrates.
FIG. 5 illustrates an example middlebox state migration from a source host to a destination host as VM is migrating from the source host to the destination host. In particular, this figure illustrates in terms of four different stages 505-520 that a middlebox element running in a host uses a state sharing manager and a VM migration manager to send state to another middlebox element running in another host.
This figure illustrates two hosts 155 and 165 described above by reference to FIG. 1. Implementation of the logical forwarding elements of the logical network topology 100 in the MSEs of the hosts 155 and 165 are not depicted for simplicity of illustration. FIG. 5 also illustrates that the middlebox elements 525 and 530 in the host 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element. In addition, this figure illustrates that the hosts 155 and 165 each have a state sharing manager and a VM migration manager.
The middlebox state can be categorized into two types. The first type of state includes information that is useful to more than one non-backup middlebox instance. An example of such type of state is health information of a set of servers or a mapping of a virtual IP address to a list of real IP addresses of a set of servers when the middlebox instances provide a load balancing service. Usually, all of the middlebox instances that together provide the load balancing service need the health information.
The second type of state includes information that is useful only for a middlebox element in one host. An example of such type of state is a mapping of a source IP address and a real IP address of a server when the middlebox instance is providing a load balancing service. Unless another host is a back-up host running a back-up middlebox instance, this mapping of addresses is not useful for another middlebox instance running in another host because the VM whose IP address is the source IP address does not exist in the other host. Therefore, this type of state usually does not have to be shared by the middlebox instances running in different hosts because other middlebox instances do not need it. This type of state is referred to as “local-only” state.
Depending on the middlebox service that the middlebox instances provide, the portion of middlebox state that is of the first type for a particular VM varies. For instance, the middlebox instances providing an IDS service have more of the first type of state because the middlebox instances need to monitor network activities in different hosts to detect a possible attack. The middlebox instances providing a load balancing service have mostly local-only state and little of the first type of state that is useful to be shared by the middlebox instances.
In some embodiments, the middlebox element proactively sends the first type of the middlebox state to the state sharing manager so that different middlebox elements in different hosts can share that type of middlebox state.
At the first stage 505, the VM migration manager 535 of the host 155 pre-notifies the state sharing manager 560 that VM 550 that is currently running in the host 155 is going to be migrated to another host. In some embodiments, the network control system configures the state sharing manager running in a host in such a way that the state sharing manager registers for a callback from the VM migration manager in the event of VM migration. In this example, the state sharing manager 560 is configured to register for a callback from the VM migration manager 535 and thus the VM migration manager 535 sends a pre-notification to the state sharing manager 560.
As shown in the first stage 505, the state sharing manager 560 maintains only the first type of middlebox state for the VM 550 located on the same host as the state sharing manager 560 because the middlebox element 525 has proactively sent only the first type of the middlebox state related to the VM 550. The state sharing manager asks for the rest of the middlebox state related to the VM 550. That is, the state sharing manager asks for the local-only state in order to have a complete middlebox state for the VM 550. When the middlebox element 525 is the type of middlebox that shares all or most of the state, there is nothing or not much more state to ask for from the middlebox element 525.
At the second stage 510, the middlebox element 525 identifies the middlebox state that is local-only state related to the VM 550 in order to fulfill the request from the state sharing manager 560. As mentioned above, the middlebox element of some embodiments uses the slice identifier and/or the VM-specific identifier to identify the middlebox state related to the VM in the middlebox element. The middlebox element gathers the state for the VM from the slice that includes the state.
The middlebox element of some embodiments sends the gathered local-only state for the VM to the state sharing manager by e.g., using one of the API calls that the state sharing manager supports. In some embodiments, the state sharing manager does not share the local-only state with other state sharing managers in other hosts. In some embodiments, the state sharing manager sends the local-only state to the VM migration manager. In other embodiments, the middlebox element directly sends the local-only middlebox state to the VM migration manager. Regardless of whether the middlebox element or the state sharing manager sends the local-only state to the VM migration manager, the VM migration manager of some embodiments is responsible for sending only the local-only state to the destination host in these embodiments.
As the VM continues to function in the source host, the state related to the VM also changes. The middlebox element identifies local-only changes and sends these changes to the state to the VM migration manager directly or via the state sharing manager. The middlebox element identifies changes to the first type of state and sends this to the state sharing manager so that the state sharing manager shares changes to the first type of state with other state sharing managers in other hosts. The middlebox element sends out the updates to the states until the VM migration manager stuns the VM to move the VM to the destination host.
The third stage 515 shows that the VM migration manager 515 has stunned the VM 550 and is sending the local-only middlebox state of the VM 550 and the VM 550 (e.g., the VM's state) to the host 165, which is the destination host to which the VM 550 is migrating in this example. In some embodiments, the VM migration manager of the source host sends the middlebox state and the VM state to the VM migration manager of the destination host. The VM migration manager at the destination host provisions the migrating VM in the destination host. The VM migration manager at the destination host provides the middlebox state to the state sharing manager running in the destination host or to the middlebox element running in the destination host.
The fourth stage 520 shows that the VM migration manager 540 of the host 165 has received the local-only state from the VM migration manager 535 of the host 155 and has sent the middlebox state to the state sharing manager 565 of the host 165. The state sharing manager 565 then signals the middlebox element 530 of the host 165 that middlebox state for a new slice for the VM 550 have arrived. In some embodiments, the middlebox element 530 then obtains the local-only middlebox state related to the migrated VM 550 from the state sharing manager 565 by, e.g., making an API call that the state sharing manager supports. In other embodiments, the middlebox element 530 may get the local-only middlebox state from the VM migration manager 540 directly. The middlebox 530 of some embodiments gets the first type of middlebox state through the state sharing manager 565.
The middlebox element 530 of some embodiments creates a middlebox slice for VM 550 (if there is not a slice of the middlebox element for the logical network that the VM 550 belongs to) and uses the middlebox state to resume the middlebox service to the VM 550. The middlebox element 530 of some embodiments then sends an acknowledgement to the state sharing manager 565. Once the middlebox state related to the migrated VM 550 are restored in the middlebox element 530, the state sharing manager 565 in some embodiments sends an acknowledgement to the VM migration manager 540. In other embodiments, the middlebox element 530 sends the acknowledgement directly to the VM migration manager. Upon receiving acknowledgement from the middlebox element 530 or the state sharing manager 565, the VM migration manager 540 starts the VM 550 in the host 165.
The fourth stage 520 also shows that the VM 550 is not in the host 155 and the middlebox element 525 does not have the middlebox state for the VM 550. In some embodiments, the middlebox element of the source host explicitly deletes the middlebox state related to the VM migrated out of the source host. Alternatively or conjunctively, the middlebox element of the source host lets the middlebox state of the migrated VM expire (e.g., by garbage-collecting the middlebox state that has an expired time to live (TTL)). The state sharing manager 560 of the source host 155 may keep the shared middlebox state, which the middlebox element 525 had proactively shared at the first stage 505, in the host 155 so that middlebox element 525 can get and use the state for other VMs (not shown) running in the host 155.
FIG. 6 illustrates in four stages 605-620 an example middlebox state migration from a source host to a destination host after VM has migrated from the source host to the destination host. In this example, the middlebox element running in the source host uses a state sharing manager and a VM migration manager to send state to another middlebox element running in another host. However, the VM migration manager in this example does not send a pre-notification for imminent VM migration to the middlebox element or the state sharing manager.
This figure illustrates two hosts 155 and 165 described above by reference to FIG. 1. Implementation of the logical forwarding elements of the logical network topology 100 in the MSEs of the hosts 155 and 165 are not depicted for simplicity of illustration. FIG. 6 also illustrates that the middlebox elements 625 and 630 in the hosts 155 and 165 maintain the middlebox state of the VMs located on the same host as the middlebox element. In addition, this figure illustrates that the hosts 155 and 165 each have a state sharing manager and a VM migration manager.
As shown in the first stage 605, the state sharing manager 660 has been maintaining the middlebox state for the VM 650. As mentioned above, the middlebox element proactively sends the first type of middlebox state to the state sharing manager. In this example, the middlebox element 625 has sent only the first type of the middlebox state related to the VM 650. The first stage 605 also shows that the VM migration manager 635 of the host 155 has migrated VM 650 from the host 155 to the host 165 without sending a pre-notification to the state sharing manager 660 or the middlebox element 625 before the migration of the VM 650.
At the second stage 610, the MSE 670 detects the migration of the VM 650 into the host 165. In some embodiments, the MSE of the destination host detects a new VM being coupled to the MSE and creates a new port to forward packets to and from the new VM. The MSE of the destination host also reports the addition of a new VM to a physical controller that manages the MSE. The physical controller in turn asks the VM migration manager of the source host to fetch the middlebox state related to the migrated VM and send the state to the destination host.
The MSE 670 reports the addition of the VM 650 to the physical controller 675. The physical controller 675 then asks the VM migration manager 635 of the host 155 to gather the middlebox state related to the VM 650. The VM migration manager 635 of some embodiments then asks the state sharing manager 660 to provide the middlebox state for the VM 650.
At the third stage 615, the state sharing manager 660 gathers the middlebox state that the VM migration manager 635 asked for in the previous stage 610. As mentioned above, in some embodiments, the middlebox element proactively sends only the first type of the middlebox state to the state sharing manager. The state sharing manager 660 shares the first type of the middlebox state with the state sharing manager 665 of the host 165. On the other hand, the VM migration manager 635 receives the local-only middlebox state of the VM 650 from the middlebox element 625 directly or via the state sharing manager 660. The VM migration manager 635 then sends the middlebox state to the VM migration manager 640 of the destination host 165 as shown in the stage 615.
The fourth stage 620 shows that the VM migration manager 640 of the host 165 has received the state from the VM migration manager 635 of the host 155 and has sent the middlebox state to the middlebox element 630 directly or via the state sharing manager 665 of the host 165. The VM migration signals the middlebox element 630 of the host 165 (either directly or via the state sharing manager 665) that middlebox state for a new slice for the VM 650 has arrived. In some embodiments, the middlebox element 630 then obtains all the middlebox state related to the migrated VM 650 from the state sharing manager 665 by, e.g., making an API call that the state sharing manager supports. The middlebox element 630 of some embodiments creates a middlebox slice for VM 650 (if there is not a slice of the middlebox element for the logical network that the VM 650 belongs to) and uses the middlebox state to resume the middlebox service to the VM 650.
II. Network Control System
Section I above described a distributed middlebox implementation architecture and middlebox state migration. As mentioned above, in some embodiments, the middleboxes may be provisioned through a network control system that is also used to provision the MSEs that implement the logical forwarding elements of the network. In some embodiments, the network control system is a hierarchical set of network controllers.
FIG. 7 illustrates a network control system 700 of some embodiments for configuring MSEs and distributed middlebox elements in order to implement logical networks. As shown, the network control system 700 includes an input translation controller 705, a logical controller 710, physical controllers 715 and 720, and hosts 725-740. As shown, the hosts 725-740 include both MSE and middlebox elements, which may be implemented as shown above in FIG. 5. One of ordinary skill in the art will recognize that many other different combinations of the various controllers and hosts are possible for the network control system 700.
In some embodiments, each of the controllers in a network control system has the capability to function as an input translation controller, logical controller, and/or physical controller. Alternatively, in some embodiments a given controller may only have the functionality to operate as a particular type of controller (e.g., as a physical controller). In addition, different combinations of controllers may run in the same physical machine. For instance, the input translation controller 705 and the logical controller 710 may run in the same computing device, with which a user interacts.
The input translation controller 705 of some embodiments includes an input translation application that translates network configuration information received from a user. For example, a user may specify a network topology such as that shown in FIG. 1, which includes a specification as to which machines belong in which logical domain. This effectively specifies a logical datapath set, or a set of logical forwarding elements. For each of the logical switches, the user specifies the machines that connect to the logical switch (i.e., to which logical ports are assigned for the logical switch). In some embodiments, the user also specifies IP addresses for the machines. The input translation controller 705 translates the entered network topology into logical control plane data that describes the network topology. For example, an entry might state that a particular MAC address A is located at a particular logical port N of a particular logical switch.
In some embodiments, each logical network is governed by a particular logical controller (e.g., logical controller 710). The logical controller 710 of some embodiments translates the logical control plane data into LFP data, and the LFP data into UPCP data. LFP data, in some embodiments, consists of flow entries described at a logical level. For the MAC address A at logical port N, LFP data might include a flow entry specifying that if the destination of a packet matches MAC A, forward the packet to port N.
The UPCP data of some embodiments is a data plane that enables the control system of some embodiments to scale even when it contains a large number of MSEs (e.g., thousands) to implement a logical datapath set. The UPCP abstracts common characteristics of different MSEs in order to express physical control plane data without considering differences in the MSEs and/or location specifics of the MSEs.
As stated, the logical controller 710 of some embodiments translates logical control plane data into LFP data (e.g., logical flow entries), then translates the LFP data into UPCP data. In some embodiments, the logical controller application stack includes a control application for performing the first translation and a virtualization application for performing the second translation. Both of these applications, in some embodiments, use a rules engine for mapping a first set of tables into a second set of tables. That is, the different data planes are represented as tables, and the controller applications use a table mapping engine to translate between the data planes.
Each of the physical controllers 715 and 720 is a master of one or more MSEs (e.g., located within host machines). In this example, each of the two physical controllers are masters of two MSEs each. In some embodiments, a physical controller receives the UPCP information for a logical network and translates this data into CPCP information for the particular MSEs that the physical controller manages. In other embodiments, the physical controller passes the appropriate UPCP data to the MSE, which includes the ability (e.g., in the form of a chassis controller running on the host machine) to perform the conversion itself.
The UPCP to CPCP translation involves a customization of various data in the flow entries. For the example noted above, the UPCP would involve several flow entries. The first entry states that if a packet matches the particular logical datapath set (e.g., based on the packet being received at a particular logical ingress port), and the destination address matches MAC A, then forward the packet to logical port N. This flow entry will be the same in the universal and CPCPs, in some embodiments. Additional flows are generated to match a physical ingress port (e.g., a virtual interface of the host machine) to the logical ingress port N (for packets received from MAC A), as well as to match logical port N to the particular egress port of the physical MSE. However, these physical ingress and egress ports are specific to the host machine containing the MSE. As such, the UPCP entries include abstract physical ports while the CPCP entries include the actual physical ports involved.
In some embodiments, the network control system also disseminates data relating to the middleboxes of a logical network. The network control system may disseminate middlebox configuration data, data relating to the sending and receiving of packets to/from the middlebox elements at the MSEs and to/from the MSEs at the middleboxes, and data relating to the middlebox elements' interactions with the VM migration managers.
As shown in FIG. 7, the same network control system distributes data to distributed middleboxes in some embodiments. Several physical controllers are used to disseminate the configuration of a distributed middlebox. In this case, both the physical controllers 715 and 720 are assigned to disseminate the configuration for the distributed middlebox.
In order to incorporate the middleboxes, the flow entries propagated through the network control system to the MSEs will include entries for sending the appropriate packets to the appropriate middleboxes (e.g., flow entries that specify for packets having a source IP address in a particular subnet to be forwarded to a particular middlebox). In addition, the flow entries for the MSE will need to specify how to send such packets to the middleboxes. That is, once a first entry specifies a logical egress port of the logical router to which a particular middlebox is bound, additional entries are required to attach the logical egress port to the middlebox.
For the distributed middlebox, the packet does not have to actually leave the host machine in order to reach the middlebox. However, the MSE nevertheless needs to include flow entries for sending the packet to the middlebox element on the host machine. These flow entries, again, include an entry to match the logical egress port of the logical router to a port connecting to the middlebox element. However, in this case the middlebox element attaches to a software abstraction of a port in the MSE. The software abstraction of the port in the MSE is not attached to a port in the MSE. The flow entries in the MSE send packets to this software abstraction in order for the packets to be routed within the host machine to the middlebox element.
In some embodiments, the MSE adds slicing information to the packet. Essentially, this slicing information is a tag that indicates to which of the (potentially) several instances being run by the middlebox the packet should be sent. Thus, when the middlebox receives the packet, the tag enables the middlebox to use the appropriate set of rules for packet processing, analysis, modification, etc. in order to perform its operations on the packet. Some embodiments, rather than adding slicing information to the packet, define different ports of the MSE for each middlebox instance and essentially use the ports to slice the traffic destined for the middlebox element.
The above describes the propagation of the forwarding data to the MSEs. In addition, some embodiments use the network control system to propagate configuration data to the middleboxes. FIG. 8 conceptually illustrates the propagation of data through the network control system of some embodiments. On the left side of the figure is the data flow to the MSEs that implement a logical network, while the right side of the figure shows the propagation of both middlebox configuration data as well as network attachment and slicing data to the middleboxes.
On the left side, the input translation controller 805 receives a network configuration through an API, which is converted into logical control plane data. This network configuration data includes a logical topology such as that shown in FIG. 1. In addition, the network configuration data of some embodiments includes routing policies that specify which packets are sent to the middlebox. When the middlebox is located on a logical wire between two logical forwarding elements (e.g., between a logical router and a logical switch), then all packets sent over that logical wire will automatically be forwarded to the middlebox. However, for an out-of-band middlebox such as that in network architecture 100, the logical router will only send packets to the middlebox when particular policies are specified by the user.
Whereas routers and switches are normally configured to forward packets according to the destination address (e.g., MAC address or IP address) of the packet, policy routing allows forwarding decisions to be made based on other information stored by the packet (e.g., source addresses, a combination of source and destination addresses, etc.). For example, the user might specify that all packets with source IP addresses in a particular subnet or that have destination IP addresses not matching a particular set of subnets, should be forwarded to the middlebox.
As shown, the logical control plane data is converted by the logical controller 810 (specifically, by the control application of the logical controller) to LFP data, and then subsequently (by the virtualization application of the logical controller) to UPCP data. In some embodiments, these conversions generate a flow entry (at the LFP), then adds a match over the logical datapath set (at the UPCP). The UPCP also includes additional flow entries for mapping generic physical ingress ports (i.e., a generic abstraction of a port not specific to any particular physical host machine) to logical ingress ports as well as for mapping logical egress ports to generic physical egress ports.
The physical controller 815 (one of the several physical controllers), as shown, translates the UPCP data into CPCP data for the particular MSEs that it manages. This conversion involves substituting specific data (e.g., specific physical ports) for the generic abstractions in the UPCP data. For instance, in the example of the above paragraph, the port integration entries are configured to specify the physical layer port appropriate for the particular middlebox configuration. This port might be a virtual NIC if the middlebox element runs as a virtual machine on the host machine, or the previously-described software port abstraction within the MSE when the middlebox element runs as a process (e.g., daemon) within the hypervisor on the virtual machine. In some embodiments, for the latter situation, the port is an IPC channel or TUN/TAP device-like interface. In some embodiments, the MSE includes one specific port abstraction for the middlebox element and sends this information to the physical controller in order for the physical controller to customize the physical control plane flows.
In addition, in some embodiments the physical controller adds flow entries specifying slicing information particular to the middlebox. For instance, for a particular MSE, the flow entry may specify to add a particular tag (e.g., a VLAN tag or similar tag) to a packet before sending the packet to the particular middlebox element. This slicing information enables the middlebox element to receive the packet and identify which of its several independent instances should process the packet.
The MSE 725 (one of several MSEs managed by the physical controller 715) performs a translation of the CPCP data into physical forwarding plane data. The physical forwarding plane data, in some embodiments, are the flow entries stored within a switching element (either a physical router or switch or a software switching element) against which the switching element actually matches received packets.
The right side of FIG. 8 illustrates two sets of data propagated to a distributed middlebox rather than the MSEs. The first of these sets of data is the actual middlebox configuration data, that includes various rules specifying the operation of the particular logical middlebox. This data may be received at the input translation controller 805 or a different input interface, through an API particular to the middlebox implementation. In some embodiments, different middlebox implementations will have different interfaces presented to the user (i.e., the user will have to enter information in different formats for different particular middleboxes). As shown, the user enters a middlebox configuration, which is translated by the middlebox API into middlebox configuration data.
In some embodiments, the middlebox configuration data is a set of records, with each record specifying a particular rule. These records, in some embodiments, are in a similar format to the flow entries propagated to the MSEs. In fact, some embodiments use the same applications on the controllers to propagate the middlebox configuration records as for the flow entries, and the same table mapping language (e.g., nLog) for the records.
The middlebox configuration data, in some embodiments, is not translated by the logical or physical controller, while in other embodiments the logical and/or physical controller perform at least a minimal translation of the middlebox configuration data records. As many middlebox packet processing, modification, and analysis rules operate on the IP address (or TCP connection state) of the packets, and this information is exposed (i.e., not encapsulated within the logical port information) for packets sent to the middlebox, the middlebox configuration does not require translation from logical to physical data planes. Thus, the same middlebox configuration data is passed from the input translation controller 805 (or other interface), to the logical controller 810, to the physical controller 815.
In some embodiments, the logical controller 810 stores a description of the logical network and of the physical implementation of that physical network. The logical controller receives the one or more middlebox configuration records for a distributed middlebox, and identifies which of the various nodes (i.e., host machines) will need to receive the configuration information. In some embodiments, the entire middlebox configuration is distributed to middlebox elements at all of the host machines, so the logical controller identifies all of the machines on which at least one virtual machine resides whose packets require use of the middlebox. In general, the identified machines are the hosts for all of the virtual machines in a network (e.g., as for the middlebox shown in FIG. 1). However, some embodiments may identify a subset of the virtual machines in the network if the network topology is such that the middlebox will never be needed at certain host machines. Some embodiments make decisions about which host machines to send the configuration data to on a per-record basis. That is, each particular rule may apply only to a subset of the virtual machines (e.g., only packets originating from a particular virtual machine or subset of virtual machines), and only hosts running these virtual machines need to receive the record.
Once the logical controller identifies the particular nodes to receive the records, the logical controller identifies the particular physical controllers that manage these particular nodes. As mentioned, each host machine has an assigned master physical controller. Thus, if the logical controller identifies only first and second hosts as destinations for the configuration data, the physical controllers for these hosts will be identified to receive the data from the logical controller (and other physical controllers will not receive this data).
In order to supply the middlebox configuration data to the hosts, the logical controller of some embodiments pushes the data (using an export module that accesses the output of the table mapping engine in the logical controller) to the physical controllers. In other embodiments, the physical controllers request configuration data (e.g., in response to a signal that the configuration data is available) from the export module of the logical controller.
The physical controllers pass the data to the middlebox elements on the host machines that they manage, much as they pass the physical control plane data. In some embodiments, the middlebox configuration and the physical control plane data are sent to the same database running on the host machine, and the MSE and middlebox element retrieve the appropriate information from the database.
In some embodiments, the middlebox translates the configuration data. The middlebox configuration data will be received in a particular language to express the rules for packet processing, analysis, modification, etc. The middlebox of some embodiments compiles these rules into more optimized packet classification rules. In some embodiments, this transformation is similar to the physical control plane to physical forwarding plane data translation. When a packet is received by the middlebox, it applies the compiled optimized rules in order to efficiently and quickly perform its operations on the packet.
In addition to the middlebox configuration rules, the middlebox elements receive slicing and/or attachment information in order to receive packets from and send packets to the MSEs. This information corresponds to the information sent to the MSEs. As shown, in some embodiments the physical controller 815 generates the slicing and/or attachment information for the middlebox (i.e., this information is not generated at the input or logical controller level of the network control system).
For distributed middleboxes, the physical controllers, in some embodiments, receive information about the software port of the MSE to which the middlebox element connects from the MSE itself, then passes this information down to the middlebox element. In other embodiments, however, the use of this port is contracted directly between the middlebox element and the MSE within the host machine, so that the middlebox element does not need to receive the attachment information from the physical controller. In some such embodiments, the MSE nevertheless transmits this information to the physical controller in order for the physical controller to customize the UPCP flow entries for receiving packets from and sending packets to the middlebox element.
The slicing information generated by the physical controller, in some embodiments, consists of an identifier for the middlebox instance to be used for the particular logical network. In some embodiments, as described, the middlebox is virtualized for use by multiple logical networks. When the middlebox receives a packet from the MSE, in some embodiments the packet includes a prepended tag (e.g., similar to a VLAN tag) that identifies a particular one of the middlebox instances (i.e., a particular configured set of rules) to use in processing the packet.
As shown in FIG. 8, the middlebox translates this slicing information into an internal slice binding. In some embodiments, the middlebox uses its own internal identifiers (different from the tags prepended to the packets) in order to identify state (e.g., active TCP connections, statistics about various IP addresses, etc.) within the middlebox. Upon receiving an instruction to create a new middlebox instance and an external identifier (that is used on the packets) for the new instance, some embodiments automatically create the new middlebox instance and assign the instance an internal identifier. In addition, the middlebox stores a binding for the instance that maps the external slice identifier to the internal slice identifier.
Furthermore, each of the controllers illustrated in FIG. 8 is shown as a single controller. However, each of these controllers may actually be a controller cluster that operates in a distributed fashion to perform the processing of a logical controller, physical controller, or input translation controller.
FIG. 9 illustrates an example architecture of a network controller (e.g., a logical controller or a physical controller) 900. The network controller of some embodiments uses a table mapping engine to map data from an input set of tables to data in an output set of tables. The input set of tables in a controller includes LCP data to be mapped to logical LFP data, LFP data to be mapped to UPCP data, and/or UPCP data to be mapped to CPCP data. The input set of tables may also include middlebox configuration data to be sent to another controller and/or a distributed middlebox instance. The network controller 900, as shown, includes input tables 915, a rules engine 910, output tables 920, an importer 930, an exporter 925, a translator 935, and a persistent data storage (PTD) 940.
In some embodiments, the input tables 915 include tables with different types of data depending on the role of the controller 900 in the network control system. For instance, when the controller 900 functions as a logical controller for a user's logical forwarding elements, the input tables 915 include LCP data and LFP data for the logical forwarding elements. When the controller 900 functions as a physical controller, the input tables 915 include LFP data. The input tables 915 also include middlebox configuration data received from the user or another controller. The middlebox configuration data is associated with a logical datapath set parameter that identifies the logical switching elements to which the middlebox to be is integrated.
In addition to the input tables 915, the control application 900 includes other miscellaneous tables (not shown) that the rules engine 910 uses to gather inputs for its table mapping operations. These miscellaneous tables include constant tables that store defined values for constants that the rules engine 910 needs to perform its table mapping operations (e.g., the value 0, a dispatch port number for resubmits, etc.). The miscellaneous tables further include function tables that store functions that the rules engine 910 uses to calculate values to populate the output tables 920.
The rules engine 910 performs table mapping operations that specify one manner for converting input data to output data. Whenever one of the input tables is modified (referred to as an input table event), the rules engine performs a set of table mapping operations that may result in the modification of one or more data tuples in one or more output tables.
In some embodiments, the rules engine 910 includes an event processor (not shown), several query plans (not shown), and a table processor (not shown). Each query plan is a set of rules that specifies a set of join operations that are to be performed upon the occurrence of an input table event. The event processor of the rules engine 910 detects the occurrence of each such event. In some embodiments, the event processor registers for callbacks with the input tables for notification of changes to the records in the input tables 915, and detects an input table event by receiving a notification from an input table when one of its records has changed.
In response to a detected input table event, the event processor (1) selects an appropriate query plan for the detected table event, and (2) directs the table processor to execute the query plan. To execute the query plan, the table processor, in some embodiments, performs the join operations specified by the query plan to produce one or more records that represent one or more sets of data values from one or more input and miscellaneous tables. The table processor of some embodiments then (1) performs a select operation to select a subset of the data values from the record(s) produced by the join operations, and (2) writes the selected subset of data values in one or more output tables 920.
Some embodiments use a variation of the Datalog database language to allow application developers to create the rules engine for the controller, and thereby to specify the manner by which the controller maps logical datapath sets to the controlled physical switching infrastructure. This variation of the Dartalog database language is referred to herein as nLog. Like Datalog, nLog provides a few declaratory rules and operators that allow a developer to specify different operations that are to be performed upon the occurrence of different events. In some embodiments, nLog provides a limited subset of the operators that are provided by Datalog in order to increase the operational speed of nLog. For instance, in some embodiments, nLog only allows the AND operator to be used in any of the declaratory rules.
The declaratory rules and operations that are specified through nLog are then compiled into a much larger set of rules by an nLog compiler. In some embodiments, this compiler translates each rule that is meant to address an event into several sets of database join operations. Collectively the larger set of rules forms the table mapping rules engine that is referred to as the nLog engine.
Some embodiments designate the first join operation that is performed by the rules engine for an input event to be based on the logical datapath set parameter. This designation ensures that the rules engine's join operations fail and terminate immediately when the rules engine has started a set of join operations that relate to a logical datapath set (i.e., to a logical network) that is not managed by the controller.
Like the input tables 915, the output tables 920 include tables with different types of data depending on the role of the controller 900. When the controller 900 functions as a logical controller, the output tables 915 include LFP data and UPCP data for the logical switching elements. When the controller 900 functions as a physical controller, the output tables 920 include CPCP data. Like the input tables, the output tables 920 may also include the middlebox configuration data. Furthermore, the output tables 920 may include a slice identifier when the controller 900 functions as a physical controller.
In some embodiments, the output tables 920 can be grouped into several different categories. For instance, in some embodiments, the output tables 920 can be rules engine (RE) input tables and/or RE output tables. An output table is a RE input table when a change in the output table causes the rules engine to detect an input event that requires the execution of a query plan. An output table can also be an RE input table that generates an event that causes the rules engine to perform another query plan. An output table is a RE output table when a change in the output table causes the exporter 925 to export the change to another controller or a MSE. An output table can be an RE input table, a RE output table, or both an RE input table and a RE output table.
The exporter 925 detects changes to the RE output tables of the output tables 920. In some embodiments, the exporter registers for callbacks with the RE output tables for notification of changes to the records of the RE output tables. In such embodiments, the exporter 925 detects an output table event when it receives notification from a RE output table that one of its records has changed.
In response to a detected output table event, the exporter 925 takes each modified data tuple in the modified RE output tables and propagates this modified data tuple to one or more other controllers or to one or more MSEs. When sending the output table records to another controller, the exporter in some embodiments uses a single channel of communication (e.g., a RPC channel) to send the data contained in the records. When sending the RE output table records to MSEs, the exporter in some embodiments uses two channels. One channel is established using a switch control protocol (e.g., OpenFlow) for writing flow entries in the control plane of the MSE. The other channel is established using a database communication protocol (e.g., JSON) to send configuration data (e.g., port configuration, tunnel information).
In some embodiments, the controller 900 does not keep in the output tables 920 the data for logical datapath sets that the controller is not responsible for managing (i.e., for logical networks managed by other logical controllers). However, such data is translated by the translator 935 into a format that can be stored in the PTD 940 and is then stored in the PTD. The PTD 940 propagates this data to PTDs of one or more other controllers so that those other controllers that are responsible for managing the logical datapath sets can process the data.
In some embodiments, the controller also brings the data stored in the output tables 920 to the PTD for resiliency of the data. Therefore, in these embodiments, a PTD of a controller has all the configuration data for all logical datapath sets managed by the network control system. That is, each PTD contains the global view of the configuration of the logical networks of all users.
The importer 930 interfaces with a number of different sources of input data and uses the input data to modify or create the input tables 915. The importer 930 of some embodiments receives the input data from another controller. The importer 930 also interfaces with the PTD 940 so that data received through the PTD from other controller instances can be translated and used as input data to modify or create the input tables 915. Moreover, the importer 930 also detects changes with the RE input tables in the output tables 920.
III. Electronic System
Many of the above-described features and applications are implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
In this specification, the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
FIG. 10 conceptually illustrates an electronica computer system 1000 with which some embodiments of the invention are implemented. The electronic system 1000 may be a computer, server, dedicated switch, phone, or any other sort of electronic device. Such an electronic system includes various types of computer readable media and interfaces for various other types of computer readable media. Electronic system 1000 includes a bus 1005, processing unit(s) 1010, a system memory 1025, a read-only memory 1030, a permanent storage device 1035, input devices 1040, and output devices 1045.
The bus 1005 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the electronic system 1000. For instance, the bus 1005 communicatively connects the processing unit(s) 1010 with the read-only memory 1030, the system memory 1025, and the permanent storage device 1035.
From these various memory units, the processing unit(s) 1010 retrieve instructions to execute and data to process in order to execute the processes of the invention. The processing unit(s) may be a single processor or a multi-core processor in different embodiments.
The read-only-memory (ROM) 1030 stores static data and instructions that are needed by the processing unit(s) 1010 and other modules of the electronic system. The permanent storage device 1035, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the electronic system 1000 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1035.
Other embodiments use a removable storage device (such as a floppy disk, flash drive, or ZIP® disk, and its corresponding disk drive) as the permanent storage device. Like the permanent storage device 1035, the system memory 1025 is a read-and-write memory device. However, unlike storage device 1035, the system memory is a volatile read-and-write memory, such a random access memory. The system memory stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention's processes are stored in the system memory 1025, the permanent storage device 1035, and/or the read-only memory 1030. From these various memory units, the processing unit(s) 1010 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
The bus 1005 also connects to the input and output devices 1040 and 1045. The input devices enable the user to communicate information and select commands to the electronic system. The input devices 1040 include alphanumeric keyboards and pointing devices (also called “cursor control devices”). The output devices 1045 display images generated by the electronic system. The output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
Finally, as shown in FIG. 10, bus 1005 also couples electronic system 1000 to a network 1065 through a network adapter (not shown). In this manner, the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of electronic system 1000 may be used in conjunction with the invention.
Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some embodiments are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some embodiments, such integrated circuits execute instructions that are stored on the circuit itself.
As used in this specification and any claims of this application, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification and any claims of this application, the terms “computer readable medium” and “computer readable media” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.

Claims (18)

What is claimed is:
1. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for:
configuring, in a first host, a first middlebox instance to:
receive a notification from a migration module before a virtual machine (VM) running in the first host migrates to a second host; and
send middlebox state related to the VM to the migration module,
wherein the migration module migrates the middlebox state to the second host.
2. The non-transitory machine readable medium of claim 1, wherein the sets of instructions further comprise a set of instructions for:
configuring, in the second host, a second middlebox instance to:
receive the middlebox state related to the VM; and
resume a middlebox service based on the middlebox state.
3. The non-transitory machine readable medium of claim 1, wherein the migration module migrates the VM to the second host.
4. The non-transitory machine readable medium of claim 1, wherein the migration module is part of a hypervisor of the first host.
5. A non-transitory machine readable medium storing a distributed middlebox application for execution by at least one processing unit of a host machine, the host machine comprising a migration module that migrates a virtual machine (VM) to another host machine, the distributed middlebox application comprising sets of instructions for:
receiving a notification from the migration module before the migration module migrates the VM to the other host machine;
identifying middlebox state that relates to the VM; and
supplying the identified middlebox state to the migration module,
wherein the migration module subsequently migrates the middlebox state to the other host machine.
6. The non-transitory machine readable medium of claim 5, wherein the distributed middlebox application at least partially implements a logical middlebox that is part of a logical network.
7. The non-transitory machine readable medium of claim 6, wherein the logical network includes a set of logical forwarding elements that are implemented in a plurality of managed switching elements.
8. The non-transitory machine readable medium of claim 7, wherein a managed switching element is running in the hosted machine.
9. The non-transitory machine readable medium of claim 5, wherein the migration module is part of a hypervisor of the host machine.
10. A non-transitory machine readable medium of a first controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the network control system comprising a plurality of controllers, the non-transitory machine readable medium storing sets of instructions for:
receiving configuration data for configuring, in a first host, a middlebox instance to migrate middlebox state of a virtual machine (VM) to a second host when the VM migrates from the first host to the second host;
identifying a set of other controllers in the network control system that manage the middlebox instance; and
directing the identified set of other controllers to send the configuration data to the middlebox instance.
11. The non-transitory machine readable medium of claim 10, wherein the configuration data includes a set of instructions for receiving a notification from a migration module of the first host.
12. The non-transitory machine readable medium of claim 11, wherein the configuration data include a set of instructions for identifying middlebox state that relates to the VM.
13. The non-transitory machine readable medium of claim 12, wherein the configuration data includes a set of instructions for supplying the identified middlebox state to the migration module.
14. The non-transitory machine readable medium of claim 12, wherein the network control system is for generating physical control plane data for managing first and second managed forwarding elements that implement forwarding operations associated with a first logical datapath set, wherein the sets of instructions further comprise a set of instructions for converting logical control plane data for the first logical datapath set to universal physical control plane data.
15. The non-transitory machine readable medium of claim 14, wherein the first controller is a master controller for the first logical datapath set, wherein each of the identified set of other controllers is a master controller for a set of managed forwarding elements that are hosted together with the middlebox instances.
16. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for:
configuring, in a first host, a first middlebox instance to:
share a first middlebox state with a second middlebox instance that is configured in a second host; and
send a second middlebox state to a migration module of the first host that subsequently migrates the second middlebox state,
wherein the first middlebox state and the second middlebox state relate to a virtual machine (VM) that is running in the first host.
17. The non-transitory machine readable medium of claim 16, wherein the migration module migrates the VM to the second host.
18. The non-transitory machine readable medium of claim 16, wherein the first middlebox state and the second middlebox state do not overlap.
US13/678,520 2011-11-15 2012-11-15 Migrating middlebox state for distributed middleboxes Active 2033-12-10 US9195491B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/678,520 US9195491B2 (en) 2011-11-15 2012-11-15 Migrating middlebox state for distributed middleboxes
US14/942,948 US9552219B2 (en) 2011-11-15 2015-11-16 Migrating middlebox state for distributed middleboxes
US15/398,689 US10235199B2 (en) 2011-11-15 2017-01-04 Migrating middlebox state for distributed middleboxes

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161560279P 2011-11-15 2011-11-15
US13/678,520 US9195491B2 (en) 2011-11-15 2012-11-15 Migrating middlebox state for distributed middleboxes

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/942,948 Continuation US9552219B2 (en) 2011-11-15 2015-11-16 Migrating middlebox state for distributed middleboxes

Publications (2)

Publication Number Publication Date
US20130125120A1 US20130125120A1 (en) 2013-05-16
US9195491B2 true US9195491B2 (en) 2015-11-24

Family

ID=48280562

Family Applications (27)

Application Number Title Priority Date Filing Date
US13/678,518 Active 2033-04-15 US8913611B2 (en) 2011-08-17 2012-11-15 Connection identifier assignment and source network address translation
US13/678,504 Active US9015823B2 (en) 2011-11-15 2012-11-15 Firewalls in logical networks
US13/678,498 Active 2033-03-31 US8966024B2 (en) 2011-11-15 2012-11-15 Architecture of networks with middleboxes
US13/678,485 Active 2033-04-01 US8966029B2 (en) 2011-11-15 2012-11-15 Network control system for configuring middleboxes
US13/678,536 Active 2034-01-17 US10089127B2 (en) 2011-11-15 2012-11-15 Control plane interface for logical middlebox services
US13/678,512 Active 2032-11-18 US9172603B2 (en) 2011-11-15 2012-11-15 WAN optimizer for logical networks
US13/678,522 Active 2035-07-07 US10514941B2 (en) 2011-08-17 2012-11-15 Load balancing and destination network address translation middleboxes
US13/678,520 Active 2033-12-10 US9195491B2 (en) 2011-11-15 2012-11-15 Migrating middlebox state for distributed middleboxes
US14/549,517 Active US9306909B2 (en) 2011-11-15 2014-11-20 Connection identifier assignment and source network address translation
US14/549,512 Active 2033-11-20 US9697030B2 (en) 2011-11-15 2014-11-20 Connection identifier assignment and source network address translation
US14/595,199 Active US9697033B2 (en) 2011-11-15 2015-01-12 Architecture of networks with middleboxes
US14/595,195 Active 2033-05-04 US9558027B2 (en) 2011-11-15 2015-01-12 Network control system for configuring middleboxes
US14/687,869 Pending US20150222598A1 (en) 2011-11-15 2015-04-15 Firewalls in logical networks
US14/942,948 Active US9552219B2 (en) 2011-11-15 2015-11-16 Migrating middlebox state for distributed middleboxes
US15/398,689 Active 2033-02-06 US10235199B2 (en) 2011-11-15 2017-01-04 Migrating middlebox state for distributed middleboxes
US15/398,709 Active 2033-01-01 US10310886B2 (en) 2011-11-15 2017-01-04 Network control system for configuring middleboxes
US15/618,951 Active US10191763B2 (en) 2011-11-15 2017-06-09 Architecture of networks with middleboxes
US16/147,831 Active US10977067B2 (en) 2011-11-15 2018-09-30 Control plane interface for logical middlebox services
US16/238,446 Active 2032-12-22 US10884780B2 (en) 2011-11-15 2019-01-02 Architecture of networks with middleboxes
US16/403,487 Active US10922124B2 (en) 2011-11-15 2019-05-03 Network control system for configuring middleboxes
US16/680,398 Active US10949248B2 (en) 2011-11-15 2019-11-11 Load balancing and destination network address translation middleboxes
US17/140,792 Active US11372671B2 (en) 2011-11-15 2021-01-04 Architecture of networks with middleboxes
US17/174,330 Active 2033-02-08 US11593148B2 (en) 2011-11-15 2021-02-11 Network control system for configuring middleboxes
US17/200,784 Pending US20210200572A1 (en) 2011-11-15 2021-03-13 Load balancing and destination network address translation middleboxes
US17/850,925 Active US11740923B2 (en) 2011-11-15 2022-06-27 Architecture of networks with middleboxes
US18/114,613 Pending US20230205568A1 (en) 2011-11-15 2023-02-27 Network control system for configuring middleboxes
US18/219,234 Pending US20230359479A1 (en) 2011-11-15 2023-07-07 Architecture of networks with middleboxes

Family Applications Before (7)

Application Number Title Priority Date Filing Date
US13/678,518 Active 2033-04-15 US8913611B2 (en) 2011-08-17 2012-11-15 Connection identifier assignment and source network address translation
US13/678,504 Active US9015823B2 (en) 2011-11-15 2012-11-15 Firewalls in logical networks
US13/678,498 Active 2033-03-31 US8966024B2 (en) 2011-11-15 2012-11-15 Architecture of networks with middleboxes
US13/678,485 Active 2033-04-01 US8966029B2 (en) 2011-11-15 2012-11-15 Network control system for configuring middleboxes
US13/678,536 Active 2034-01-17 US10089127B2 (en) 2011-11-15 2012-11-15 Control plane interface for logical middlebox services
US13/678,512 Active 2032-11-18 US9172603B2 (en) 2011-11-15 2012-11-15 WAN optimizer for logical networks
US13/678,522 Active 2035-07-07 US10514941B2 (en) 2011-08-17 2012-11-15 Load balancing and destination network address translation middleboxes

Family Applications After (19)

Application Number Title Priority Date Filing Date
US14/549,517 Active US9306909B2 (en) 2011-11-15 2014-11-20 Connection identifier assignment and source network address translation
US14/549,512 Active 2033-11-20 US9697030B2 (en) 2011-11-15 2014-11-20 Connection identifier assignment and source network address translation
US14/595,199 Active US9697033B2 (en) 2011-11-15 2015-01-12 Architecture of networks with middleboxes
US14/595,195 Active 2033-05-04 US9558027B2 (en) 2011-11-15 2015-01-12 Network control system for configuring middleboxes
US14/687,869 Pending US20150222598A1 (en) 2011-11-15 2015-04-15 Firewalls in logical networks
US14/942,948 Active US9552219B2 (en) 2011-11-15 2015-11-16 Migrating middlebox state for distributed middleboxes
US15/398,689 Active 2033-02-06 US10235199B2 (en) 2011-11-15 2017-01-04 Migrating middlebox state for distributed middleboxes
US15/398,709 Active 2033-01-01 US10310886B2 (en) 2011-11-15 2017-01-04 Network control system for configuring middleboxes
US15/618,951 Active US10191763B2 (en) 2011-11-15 2017-06-09 Architecture of networks with middleboxes
US16/147,831 Active US10977067B2 (en) 2011-11-15 2018-09-30 Control plane interface for logical middlebox services
US16/238,446 Active 2032-12-22 US10884780B2 (en) 2011-11-15 2019-01-02 Architecture of networks with middleboxes
US16/403,487 Active US10922124B2 (en) 2011-11-15 2019-05-03 Network control system for configuring middleboxes
US16/680,398 Active US10949248B2 (en) 2011-11-15 2019-11-11 Load balancing and destination network address translation middleboxes
US17/140,792 Active US11372671B2 (en) 2011-11-15 2021-01-04 Architecture of networks with middleboxes
US17/174,330 Active 2033-02-08 US11593148B2 (en) 2011-11-15 2021-02-11 Network control system for configuring middleboxes
US17/200,784 Pending US20210200572A1 (en) 2011-11-15 2021-03-13 Load balancing and destination network address translation middleboxes
US17/850,925 Active US11740923B2 (en) 2011-11-15 2022-06-27 Architecture of networks with middleboxes
US18/114,613 Pending US20230205568A1 (en) 2011-11-15 2023-02-27 Network control system for configuring middleboxes
US18/219,234 Pending US20230359479A1 (en) 2011-11-15 2023-07-07 Architecture of networks with middleboxes

Country Status (6)

Country Link
US (27) US8913611B2 (en)
EP (8) EP2748750B1 (en)
JP (5) JP5898780B2 (en)
CN (3) CN103930882B (en)
AU (2) AU2012340383B2 (en)
WO (7) WO2013074828A1 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160344690A1 (en) * 2015-05-18 2016-11-24 Morgan Stanley Clustered server sharing
US9552219B2 (en) 2011-11-15 2017-01-24 Nicira, Inc. Migrating middlebox state for distributed middleboxes
US10346047B2 (en) 2015-04-15 2019-07-09 Formulus Black Corporation Method and apparatus for dense hyper IO digital retention
US10572186B2 (en) 2017-12-18 2020-02-25 Formulus Black Corporation Random access memory (RAM)-based computer systems, devices, and methods
US10725853B2 (en) 2019-01-02 2020-07-28 Formulus Black Corporation Systems and methods for memory failure prevention, management, and mitigation
US10789137B2 (en) 2013-02-01 2020-09-29 Formulus Black Corporation Fast system state cloning
US11038972B2 (en) * 2016-12-30 2021-06-15 Huawei Technologies Co., Ltd. Service providing method, apparatus, and system
US11140218B2 (en) 2019-10-30 2021-10-05 Vmware, Inc. Distributed service chain across multiple clouds
US11153170B1 (en) 2020-04-06 2021-10-19 Vmware, Inc. Migration of data compute node across sites
US11153406B2 (en) 2020-01-20 2021-10-19 Vmware, Inc. Method of network performance visualization of service function chains
US20210368429A1 (en) * 2019-12-31 2021-11-25 Huawei Technologies Co., Ltd. Method and apparatus for obtaining network slice identifier
US11212356B2 (en) 2020-04-06 2021-12-28 Vmware, Inc. Providing services at the edge of a network using selected virtual tunnel interfaces
US11223494B2 (en) 2020-01-13 2022-01-11 Vmware, Inc. Service insertion for multicast traffic at boundary
US11249784B2 (en) 2019-02-22 2022-02-15 Vmware, Inc. Specifying service chains
US11265187B2 (en) 2018-01-26 2022-03-01 Nicira, Inc. Specifying and utilizing paths through a network
US11283717B2 (en) 2019-10-30 2022-03-22 Vmware, Inc. Distributed fault tolerant service chain
US11296930B2 (en) 2014-09-30 2022-04-05 Nicira, Inc. Tunnel-enabled elastic service model
US11399075B2 (en) 2018-11-30 2022-07-26 Vmware, Inc. Distributed inline proxy
US11405431B2 (en) 2015-04-03 2022-08-02 Nicira, Inc. Method, apparatus, and system for implementing a content switch
US11438267B2 (en) 2013-05-09 2022-09-06 Nicira, Inc. Method and system for service switching using service tags
US11496392B2 (en) 2015-06-27 2022-11-08 Nicira, Inc. Provisioning logical entities in a multidatacenter environment
US11611625B2 (en) 2020-12-15 2023-03-21 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers
US11659061B2 (en) 2020-01-20 2023-05-23 Vmware, Inc. Method of adjusting service function chains to improve network performance
US11734043B2 (en) 2020-12-15 2023-08-22 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers
US11750476B2 (en) 2017-10-29 2023-09-05 Nicira, Inc. Service operation chaining
US11805036B2 (en) 2018-03-27 2023-10-31 Nicira, Inc. Detecting failure of layer 2 service using broadcast messages

Families Citing this family (427)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8881099B2 (en) * 2004-09-10 2014-11-04 Oracle International Corporation Dynamic generation of wrapper classes to implement call-by-value semantics
US8392684B2 (en) 2005-08-12 2013-03-05 Silver Peak Systems, Inc. Data encryption in a network memory architecture for providing data based on local accessibility
US8171238B1 (en) 2007-07-05 2012-05-01 Silver Peak Systems, Inc. Identification of data stored in memory
US8095774B1 (en) 2007-07-05 2012-01-10 Silver Peak Systems, Inc. Pre-fetching data into a memory
US8489562B1 (en) * 2007-11-30 2013-07-16 Silver Peak Systems, Inc. Deferred data storage
US8929402B1 (en) 2005-09-29 2015-01-06 Silver Peak Systems, Inc. Systems and methods for compressing packet data by predicting subsequent data
US8811431B2 (en) 2008-11-20 2014-08-19 Silver Peak Systems, Inc. Systems and methods for compressing packet data
US8885632B2 (en) 2006-08-02 2014-11-11 Silver Peak Systems, Inc. Communications scheduler
US8755381B2 (en) 2006-08-02 2014-06-17 Silver Peak Systems, Inc. Data matching using flow based packet data storage
US8307115B1 (en) 2007-11-30 2012-11-06 Silver Peak Systems, Inc. Network memory mirroring
US10164861B2 (en) 2015-12-28 2018-12-25 Silver Peak Systems, Inc. Dynamic monitoring and visualization for network health characteristics
US9717021B2 (en) 2008-07-03 2017-07-25 Silver Peak Systems, Inc. Virtual network overlay
US10805840B2 (en) 2008-07-03 2020-10-13 Silver Peak Systems, Inc. Data transmission via a virtual wide area network overlay
US8743683B1 (en) 2008-07-03 2014-06-03 Silver Peak Systems, Inc. Quality of service using multiple flows
WO2012161707A1 (en) * 2011-05-25 2012-11-29 Hewlett-Packard Development Company, L.P. Implementation of network device components in network devices
US9130991B2 (en) 2011-10-14 2015-09-08 Silver Peak Systems, Inc. Processing data packets in performance enhancing proxy (PEP) environment
US9626224B2 (en) 2011-11-03 2017-04-18 Silver Peak Systems, Inc. Optimizing available computing resources within a virtual environment
KR102006179B1 (en) * 2011-12-15 2019-08-02 삼성전자주식회사 Method and apparatus for assigning connection identifiers of device to device communications
CN104137479B (en) 2012-02-10 2017-06-20 日本电气株式会社 The method for visualizing of computer system and virtual network
CN104106237B (en) * 2012-02-10 2017-08-11 日本电气株式会社 Computer system and virtual network method for visualizing
US9264295B1 (en) 2012-03-02 2016-02-16 Big Switch Networks, Inc. Systems and methods for forwarding broadcast network packets with a controller
US9231864B2 (en) * 2012-03-19 2016-01-05 Intel Corporation Techniques for packet management in an input/output virtualization system
US9350671B2 (en) * 2012-03-22 2016-05-24 Futurewei Technologies, Inc. Supporting software defined networking with application layer traffic optimization
WO2013158917A2 (en) * 2012-04-18 2013-10-24 Nicira, Inc. Using transactions to compute and propagate network forwarding state
US9237188B1 (en) 2012-05-21 2016-01-12 Amazon Technologies, Inc. Virtual machine based content processing
US8789135B1 (en) * 2012-06-15 2014-07-22 Google Inc. Scalable stateful firewall design in openflow based networks
US10110417B1 (en) 2012-07-06 2018-10-23 Cradlepoint, Inc. Private networks overlaid on cloud infrastructure
US10880162B1 (en) 2012-07-06 2020-12-29 Cradlepoint, Inc. Linking logical broadcast domains
US10601653B2 (en) 2012-07-06 2020-03-24 Cradlepoint, Inc. Implicit traffic engineering
US10560343B1 (en) 2012-07-06 2020-02-11 Cradlepoint, Inc. People centric management of cloud networks via GUI
US9992062B1 (en) 2012-07-06 2018-06-05 Cradlepoint, Inc. Implicit traffic engineering
US10177957B1 (en) * 2012-07-06 2019-01-08 Cradlepoint, Inc. Connecting a cloud network to the internet
US10135677B1 (en) 2012-07-06 2018-11-20 Cradlepoint, Inc. Deployment of network-related features over cloud network
US20150172176A1 (en) * 2012-07-13 2015-06-18 Nec Corporation Control device, communication system, communication method and program
US8972971B2 (en) * 2012-08-09 2015-03-03 International Business Machines Corporation Image instance mapping
US10430216B1 (en) * 2012-08-23 2019-10-01 Scale Computing Inc Virtual machine automated selection
US9787570B2 (en) * 2012-10-17 2017-10-10 Verizon Patent And Licensing Inc. Dynamic feature peer network for application flows
US20140115126A1 (en) * 2012-10-19 2014-04-24 Electronics And Telecommunications Research Institute System for controlling and verifying open programmable network and method thereof
US9813295B2 (en) * 2012-11-02 2017-11-07 International Business Machines Corporation Wireless network optimization appliance
WO2014077615A1 (en) * 2012-11-19 2014-05-22 Samsung Sds Co., Ltd. Anti-malware system, method of processing packet in the same, and computing device
US9417922B2 (en) * 2012-12-03 2016-08-16 Cutting Edge Consulting Associates, Inc. Systems and methods for protecting an identity in network communications
US8989194B1 (en) * 2012-12-18 2015-03-24 Google Inc. Systems and methods for improving network redundancy and for facile initialization in a centrally-controlled network
US9253117B1 (en) 2012-12-18 2016-02-02 Google Inc. Systems and methods for reducing network hardware of a centrally-controlled network using in-band network connections
US9667527B2 (en) 2013-01-04 2017-05-30 Nec Corporation Control apparatus, communication system, tunnel endpoint control method, and program
US9350558B2 (en) 2013-01-09 2016-05-24 Dell Products L.P. Systems and methods for providing multicast routing in an overlay network
US9372726B2 (en) 2013-01-09 2016-06-21 The Research Foundation For The State University Of New York Gang migration of virtual machines using cluster-wide deduplication
US9203806B2 (en) * 2013-01-11 2015-12-01 Centripetal Networks, Inc. Rule swapping in a packet network
FR3001849B1 (en) * 2013-02-05 2016-06-24 Byo Networks METHOD FOR ROUTING DATA, COMPUTER PROGRAM, NETWORK CONTROLLER AND ASSOCIATED NETWORKS
US9395960B2 (en) * 2013-02-19 2016-07-19 PLUMgrid, Inc. Method and system for data plane abstraction to enable a dynamic creation of network applications
US10547505B2 (en) * 2013-03-01 2020-01-28 Nokia Solutions And Networks Oy Software defined networking for edge nodes
US9258254B2 (en) * 2013-03-15 2016-02-09 Oracle International Corporation Virtual router and switch
JP2016519364A (en) 2013-03-21 2016-06-30 ストローン リミテッド Deployment of data path related plug-ins
US10291515B2 (en) * 2013-04-10 2019-05-14 Huawei Technologies Co., Ltd. System and method for a control plane reference model framework
US9436716B2 (en) * 2013-05-07 2016-09-06 PLUMgrid, Inc. Method and system for data plane abstraction to enable a network storage platform ecosystem
US10218622B2 (en) * 2013-05-13 2019-02-26 Vmware, Inc. Placing a network device into a maintenance mode in a virtualized computing environment
CN104184842A (en) * 2013-05-24 2014-12-03 中兴通讯股份有限公司 Message forwarding method and device
US9521028B2 (en) * 2013-06-07 2016-12-13 Alcatel Lucent Method and apparatus for providing software defined network flow distribution
WO2014208538A1 (en) * 2013-06-25 2014-12-31 日本電気株式会社 Communication system, apparatus, method and program
WO2014205517A1 (en) * 2013-06-25 2014-12-31 Ditno. Pty Ltd Method and system for managing a host-based firewall
US9282019B2 (en) 2013-07-12 2016-03-08 Nicira, Inc. Tracing logical network packets through physical network
US9197529B2 (en) * 2013-07-12 2015-11-24 Nicira, Inc. Tracing network packets through logical and physical networks
US9979622B2 (en) * 2013-07-30 2018-05-22 Cisco Technology, Inc. Elastic WAN optimization cloud services
US9887960B2 (en) 2013-08-14 2018-02-06 Nicira, Inc. Providing services for logical networks
US9374308B2 (en) 2013-08-30 2016-06-21 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Openflow switch mode transition processing
US9503371B2 (en) * 2013-09-04 2016-11-22 Nicira, Inc. High availability L3 gateways for logical networks
US9577845B2 (en) 2013-09-04 2017-02-21 Nicira, Inc. Multiple active L3 gateways for logical networks
US9900673B2 (en) 2013-09-19 2018-02-20 Hewlett Packard Enterprise Development Lp Software defined optical network
US10033693B2 (en) 2013-10-01 2018-07-24 Nicira, Inc. Distributed identity-based firewalls
US20150100560A1 (en) 2013-10-04 2015-04-09 Nicira, Inc. Network Controller for Managing Software and Hardware Forwarding Elements
US9977685B2 (en) 2013-10-13 2018-05-22 Nicira, Inc. Configuration of logical router
US9998530B2 (en) 2013-10-15 2018-06-12 Nicira, Inc. Distributed global load-balancing system for software-defined data centers
US9298848B2 (en) * 2013-11-01 2016-03-29 International Business Machines Corporation Managing a template in an operator graph
US9634938B2 (en) * 2013-11-05 2017-04-25 International Business Machines Corporation Adaptive scheduling of data flows in data center networks for efficient resource utilization
EP3066796B1 (en) * 2013-11-05 2020-01-01 Cisco Technology, Inc. Network fabric overlay
CN103593322B (en) * 2013-11-11 2017-07-07 曙光信息产业(北京)有限公司 The collocation method and device of drive component
EP3076303A4 (en) * 2013-11-26 2017-08-09 Nec Corporation Virtual middle box management system, virtual middle box management method, and virtual middle box management program
CN104683428B (en) * 2013-11-26 2019-02-19 华为技术有限公司 Network service processing method and device
CN105814843B (en) * 2013-12-10 2019-05-03 华为技术有限公司 A kind of generation method and device of flow table
US9407504B1 (en) 2014-01-15 2016-08-02 Cisco Technology, Inc. Virtual links for network appliances
EP3007064A4 (en) * 2014-01-16 2016-09-28 Huawei Tech Co Ltd Method for loading code and network apparatus
EP3091695B1 (en) * 2014-01-29 2018-10-24 Huawei Technologies Co., Ltd. Wireless network system
US10282346B1 (en) * 2014-02-05 2019-05-07 Cisco Technology, Inc. Scalable network device self-configuration in large networks
US9215214B2 (en) 2014-02-20 2015-12-15 Nicira, Inc. Provisioning firewall rules on a firewall enforcing device
EP3047613B1 (en) 2014-03-04 2019-08-21 Huawei Technologies Co., Ltd. State-dependent data forwarding
US9419855B2 (en) 2014-03-14 2016-08-16 Nicira, Inc. Static routes for logical routers
US9313129B2 (en) * 2014-03-14 2016-04-12 Nicira, Inc. Logical router processing by network controller
CN111478852B (en) * 2014-03-14 2022-05-24 Nicira股份有限公司 Route advertisement for managed gateways
US9225597B2 (en) * 2014-03-14 2015-12-29 Nicira, Inc. Managed gateways peering with external router to attract ingress packets
US9590901B2 (en) 2014-03-14 2017-03-07 Nicira, Inc. Route advertisement by managed gateways
US9647883B2 (en) 2014-03-21 2017-05-09 Nicria, Inc. Multiple levels of logical routers
US20160352637A1 (en) * 2014-03-24 2016-12-01 Hewlett-Packard Development Company, L.P. Client-based port filter table
US9794186B2 (en) 2014-03-27 2017-10-17 Nicira, Inc. Distributed network address translation for efficient cloud service access
US9893988B2 (en) 2014-03-27 2018-02-13 Nicira, Inc. Address resolution using multiple designated instances of a logical router
US9825854B2 (en) 2014-03-27 2017-11-21 Nicira, Inc. Host architecture for efficient cloud service access
US9338091B2 (en) * 2014-03-27 2016-05-10 Nicira, Inc. Procedures for efficient cloud service access in a system with multiple tenant logical networks
WO2015152435A1 (en) 2014-03-31 2015-10-08 쿨클라우드㈜ Sdn-based division layer network system
US9215210B2 (en) 2014-03-31 2015-12-15 Nicira, Inc. Migrating firewall connection state for a firewall service virtual machine
US9906494B2 (en) 2014-03-31 2018-02-27 Nicira, Inc. Configuring interactions with a firewall service virtual machine
US9503427B2 (en) 2014-03-31 2016-11-22 Nicira, Inc. Method and apparatus for integrating a service virtual machine
US9838253B2 (en) * 2014-04-10 2017-12-05 Fujitsu Limited Object-oriented network virtualization
KR102169302B1 (en) * 2014-04-30 2020-10-23 삼성전자주식회사 A method, a terminal and a server for providing communication service
US10277422B2 (en) * 2014-05-06 2019-04-30 International Business Machines Corporation Virtual port support in a logical switch architecture
US9648121B2 (en) * 2014-05-27 2017-05-09 Ravello Systems Ltd. Source-destination network address translation (SDNAT) proxy and method thereof
US10171370B1 (en) * 2014-05-30 2019-01-01 Amazon Technologies, Inc. Distribution operating system
US9729512B2 (en) 2014-06-04 2017-08-08 Nicira, Inc. Use of stateless marking to speed up stateful firewall rule processing
US9825913B2 (en) 2014-06-04 2017-11-21 Nicira, Inc. Use of stateless marking to speed up stateful firewall rule processing
CA2950994C (en) * 2014-06-17 2023-03-07 Sercel Method and node for managing a network
US9686140B2 (en) * 2014-07-02 2017-06-20 Verizon Patent And Licensing Inc. Intelligent network interconnect
US9948496B1 (en) 2014-07-30 2018-04-17 Silver Peak Systems, Inc. Determining a transit appliance for data traffic to a software service
TW201605198A (en) 2014-07-31 2016-02-01 萬國商業機器公司 Intelligent network management device and method of managing network
EP3183831B1 (en) * 2014-08-22 2021-05-12 Level 3 Communications, LLC Software defined networking portal
US10079694B2 (en) * 2014-08-29 2018-09-18 Nokia Of America Corporation Scalable virtual networks in SDN-based ethernet networks using VLANs
US9875344B1 (en) 2014-09-05 2018-01-23 Silver Peak Systems, Inc. Dynamic monitoring and authorization of an optimization device
CN105471726B (en) * 2014-09-05 2019-08-27 华为技术有限公司 The method and apparatus of retransmitting paramater transmitting
US9923827B2 (en) 2014-09-05 2018-03-20 At&T Intellectual Property I, L.P. Load balancing and migration of transport connections
US10516608B2 (en) 2014-09-11 2019-12-24 Oath Inc. Systems and methods for directly responding to distributed network traffic
US10257095B2 (en) 2014-09-30 2019-04-09 Nicira, Inc. Dynamically adjusting load balancing
US10511458B2 (en) 2014-09-30 2019-12-17 Nicira, Inc. Virtual distributed bridging
US9798810B2 (en) 2014-09-30 2017-10-24 At&T Intellectual Property I, L.P. Methods and apparatus to track changes to a network topology
US9755898B2 (en) 2014-09-30 2017-09-05 Nicira, Inc. Elastically managing a service node group
US9768980B2 (en) 2014-09-30 2017-09-19 Nicira, Inc. Virtual distributed bridging
US10250443B2 (en) 2014-09-30 2019-04-02 Nicira, Inc. Using physical location to modify behavior of a distributed virtual network element
US10020960B2 (en) 2014-09-30 2018-07-10 Nicira, Inc. Virtual distributed bridging
US9410712B2 (en) 2014-10-08 2016-08-09 Google Inc. Data management profile for a fabric network
US10469342B2 (en) 2014-10-10 2019-11-05 Nicira, Inc. Logical network traffic analysis
US9971620B2 (en) 2014-10-15 2018-05-15 Keysight Technologies Singapore (Holdings) Pte Ltd Methods and systems for network packet impairment within virtual machine host systems
US9971619B2 (en) * 2014-10-15 2018-05-15 Keysight Technologies Singapore (Holdings) Pte Ltd Methods and systems for forwarding network packets within virtual machine host systems
US9985882B2 (en) 2014-10-29 2018-05-29 Metaswitch Networks Ltd Packet data routing
JP2016092485A (en) * 2014-10-30 2016-05-23 富士通株式会社 Information processing system, management device and information processing system control method
US20160142285A1 (en) * 2014-11-13 2016-05-19 Industrial Technology Research Institute Openflow switch and method for packet exchanging thereof, sdn controller and data flow control method thereof
CN112906077A (en) * 2014-11-14 2021-06-04 Nicira股份有限公司 Stateful services on stateless cluster edges
US11533255B2 (en) 2014-11-14 2022-12-20 Nicira, Inc. Stateful services on stateless clustered edge
US9954775B2 (en) * 2014-11-25 2018-04-24 Electronics And Telecommunications Research Institute Software-defined network (SDN) system using host abstraction, and method for implementing the same
US9692727B2 (en) * 2014-12-02 2017-06-27 Nicira, Inc. Context-aware distributed firewall
WO2016094291A1 (en) 2014-12-08 2016-06-16 Umbra Technologies Ltd. System and method for content retrieval from remote network regions
US9733846B1 (en) * 2014-12-18 2017-08-15 EMC IP Holding Company LLC Integrated backup performance enhancements by creating affinity groups
US10681145B1 (en) * 2014-12-22 2020-06-09 Chelsio Communications, Inc. Replication in a protocol offload network interface controller
CN104580168B (en) * 2014-12-22 2019-02-26 华为技术有限公司 A kind of processing method of Attacking Packets, apparatus and system
US10439908B2 (en) 2014-12-23 2019-10-08 Talari Networks Incorporated Methods and apparatus for providing adaptive private network centralized management system time correlated playback of network traffic
US9891940B2 (en) 2014-12-29 2018-02-13 Nicira, Inc. Introspection method and apparatus for network access filtering
EP3243314A4 (en) 2015-01-06 2018-09-05 Umbra Technologies Ltd. System and method for neutral application programming interface
JP2018507639A (en) * 2015-01-28 2018-03-15 アンブラ テクノロジーズ リミテッドUmbra Technologies Ltd. System and method for global virtual network
US10079779B2 (en) 2015-01-30 2018-09-18 Nicira, Inc. Implementing logical router uplinks
US20160234234A1 (en) * 2015-02-05 2016-08-11 Cisco Technology, Inc. Orchestrating the Use of Network Resources in Software Defined Networking Applications
US10038628B2 (en) 2015-04-04 2018-07-31 Nicira, Inc. Route server mode for dynamic routing between logical and physical networks
US9967134B2 (en) 2015-04-06 2018-05-08 Nicira, Inc. Reduction of network churn based on differences in input state
US9930010B2 (en) * 2015-04-06 2018-03-27 Nicira, Inc. Security agent for distributed network security system
CN113872855A (en) 2015-04-07 2021-12-31 安博科技有限公司 System and method for virtual interfaces and advanced intelligent routing in a global virtual network
US9942058B2 (en) 2015-04-17 2018-04-10 Nicira, Inc. Managing tunnel endpoints for facilitating creation of logical networks
US10374904B2 (en) 2015-05-15 2019-08-06 Cisco Technology, Inc. Diagnostic network visualization
US9558029B2 (en) * 2015-05-17 2017-01-31 Nicira, Inc. Logical processing for containers
US9916174B2 (en) * 2015-05-27 2018-03-13 International Business Machines Corporation Updating networks having virtual machines with migration information
US9378043B1 (en) * 2015-05-28 2016-06-28 Altera Corporation Multilayer quality of service (QOS) for network functions virtualization platforms
US10536357B2 (en) 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US9967158B2 (en) 2015-06-05 2018-05-08 Cisco Technology, Inc. Interactive hierarchical network chord diagram for application dependency mapping
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US11558347B2 (en) 2015-06-11 2023-01-17 Umbra Technologies Ltd. System and method for network tapestry multiprotocol integration
US10554484B2 (en) 2015-06-26 2020-02-04 Nicira, Inc. Control plane integration with hardware switches
US9755903B2 (en) 2015-06-30 2017-09-05 Nicira, Inc. Replicating firewall policy across multiple data centers
US10361952B2 (en) 2015-06-30 2019-07-23 Nicira, Inc. Intermediate logical interfaces in a virtual distributed router environment
US10185599B2 (en) * 2015-07-07 2019-01-22 Openvpn Technologies, Inc. Kernel mode accelerator
US9985837B2 (en) * 2015-07-23 2018-05-29 Cisco Technology, Inc. Refresh of the binding tables between data-link-layer and network-layer addresses on mobility in a data center environment
US9819581B2 (en) 2015-07-31 2017-11-14 Nicira, Inc. Configuring a hardware switch as an edge node for a logical router
US9967182B2 (en) 2015-07-31 2018-05-08 Nicira, Inc. Enabling hardware switches to perform logical routing functionalities
US10154009B2 (en) 2015-08-11 2018-12-11 At&T Intellectual Property I, L.P. Providing a basic firewall using a virtual networking function
US10230629B2 (en) 2015-08-11 2019-03-12 Nicira, Inc. Static route configuration for logical router
US10581976B2 (en) * 2015-08-12 2020-03-03 A10 Networks, Inc. Transmission control of protocol state exchange for dynamic stateful service insertion
US9906562B2 (en) * 2015-08-28 2018-02-27 Nicira, Inc. Associating service tags with remote data message flows based on remote device management attributes
US10057157B2 (en) 2015-08-31 2018-08-21 Nicira, Inc. Automatically advertising NAT routes between logical routers
US10313186B2 (en) 2015-08-31 2019-06-04 Nicira, Inc. Scalable controller for hardware VTEPS
US9917902B2 (en) * 2015-09-09 2018-03-13 Honeywell International Inc. System and method for scalable and efficient deployment of wireless infrastructure nodes for multiple collocated wireless field device networks
US10985990B2 (en) * 2015-09-15 2021-04-20 Huawei Technologies Co., Ltd. Software defined topology (SDT) for user plane
US10230576B2 (en) 2015-09-30 2019-03-12 Nicira, Inc. Managing administrative statuses of hardware VTEPs
US9948577B2 (en) 2015-09-30 2018-04-17 Nicira, Inc. IP aliases in logical networks with hardware switches
US10204122B2 (en) 2015-09-30 2019-02-12 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US10263828B2 (en) 2015-09-30 2019-04-16 Nicira, Inc. Preventing concurrent distribution of network data to a hardware switch by multiple controllers
US9979593B2 (en) 2015-09-30 2018-05-22 Nicira, Inc. Logical L3 processing for L2 hardware switches
EP3369211B1 (en) * 2015-10-26 2020-11-25 Nokia Solutions and Networks Oy Method and apparatus for virtualized network function decomposition
US10095535B2 (en) 2015-10-31 2018-10-09 Nicira, Inc. Static route types for logical routers
US10078527B2 (en) 2015-11-01 2018-09-18 Nicira, Inc. Securing a managed forwarding element that operates within a data compute node
US10250553B2 (en) 2015-11-03 2019-04-02 Nicira, Inc. ARP offloading for managed hardware forwarding elements
US10324746B2 (en) 2015-11-03 2019-06-18 Nicira, Inc. Extended context delivery for context-based authorization
US10986039B2 (en) * 2015-11-11 2021-04-20 Gigamon Inc. Traffic broker for routing data packets through sequences of in-line tools
US10462101B2 (en) * 2015-11-13 2019-10-29 Nanning Fugui Precision Industrial Co., Ltd. Network communication method based on software-defined networking and server using the method
US9961014B2 (en) * 2015-11-13 2018-05-01 Nanning Fugui Precision Industrial Co., Ltd. Network communication method based on software-defined networking and server using the method
WO2017098326A1 (en) 2015-12-11 2017-06-15 Umbra Technologies Ltd. System and method for information slingshot over a network tapestry and granularity of a tick
US9998375B2 (en) * 2015-12-15 2018-06-12 Nicira, Inc. Transactional controls for supplying control plane data to managed hardware forwarding elements
US10225149B2 (en) 2015-12-15 2019-03-05 Nicira, Inc. Method and tool for diagnosing logical networks
US9992112B2 (en) * 2015-12-15 2018-06-05 Nicira, Inc. Transactional controls for supplying control plane data to managed hardware forwarding elements
US9917799B2 (en) 2015-12-15 2018-03-13 Nicira, Inc. Transactional controls for supplying control plane data to managed hardware forwarding elements
US10063469B2 (en) 2015-12-16 2018-08-28 Nicira, Inc. Forwarding element implementation for containers
US10355969B2 (en) * 2015-12-25 2019-07-16 KN Install Solutions (N.IRE) Limited Data driven orchestrated network using a light weight distributed sdn controller
US10075567B1 (en) 2016-02-08 2018-09-11 Barefoot Networks, Inc. Packet generation in the data plane of a forwarding element
US11038845B2 (en) 2016-02-23 2021-06-15 Nicira, Inc. Firewall in a virtualized computing environment using physical network interface controller (PNIC) level firewall rules
US10873566B2 (en) * 2016-02-23 2020-12-22 Nicira, Inc. Distributed firewall in a virtualized computing environment
CN108780408B (en) * 2016-03-14 2022-03-22 Nicira股份有限公司 Identifying implementation status of logical entities based on global implementation number
US10243797B2 (en) * 2016-03-14 2019-03-26 Nicira, Inc. Identifying the realization status of logical entities based on a global realization number
US10313271B2 (en) 2016-03-16 2019-06-04 At&T Intellectual Property I, L.P. Providing and using a distributed forwarding service
EP3223456B1 (en) * 2016-03-24 2018-12-19 Alcatel Lucent Method for migration of virtual network function
JP6992959B2 (en) 2016-03-30 2022-01-13 日本電気株式会社 Communication processing system, communication processing device, communication processing method and communication processing program
CN105791315B (en) * 2016-04-25 2019-05-14 网宿科技股份有限公司 A kind of udp protocol acceleration method and system
US11146632B2 (en) 2016-04-26 2021-10-12 Umbra Technologies Ltd. Data beacon pulser(s) powered by information slingshot
CN105978952B (en) * 2016-04-28 2019-04-30 中国科学院计算技术研究所 A kind of flow migration method and system based on network function virtualization scene
US10333849B2 (en) 2016-04-28 2019-06-25 Nicira, Inc. Automatic configuration of logical routers on edge nodes
US10484515B2 (en) * 2016-04-29 2019-11-19 Nicira, Inc. Implementing logical metadata proxy servers in logical networks
US10348685B2 (en) 2016-04-29 2019-07-09 Nicira, Inc. Priority allocation for distributed service rules
US10135727B2 (en) 2016-04-29 2018-11-20 Nicira, Inc. Address grouping for distributed service rules
US10841273B2 (en) 2016-04-29 2020-11-17 Nicira, Inc. Implementing logical DHCP servers in logical networks
US11019167B2 (en) 2016-04-29 2021-05-25 Nicira, Inc. Management of update queues for network controller
US10547588B2 (en) * 2016-04-30 2020-01-28 Nicira, Inc. Method of translating a logical switch into a set of network addresses
US10091161B2 (en) 2016-04-30 2018-10-02 Nicira, Inc. Assignment of router ID for logical routers
US11425095B2 (en) 2016-05-01 2022-08-23 Nicira, Inc. Fast ordering of firewall sections and rules
US11171920B2 (en) 2016-05-01 2021-11-09 Nicira, Inc. Publication of firewall configuration
US10205651B2 (en) * 2016-05-13 2019-02-12 128 Technology, Inc. Apparatus and method of selecting next hops for a session
US10243845B2 (en) 2016-06-02 2019-03-26 International Business Machines Corporation Middlebox tracing in software defined networks
JP6773458B2 (en) 2016-06-08 2020-10-21 日本電気通信システム株式会社 Packet processor, packet processing method, and program
US11210121B2 (en) * 2016-06-09 2021-12-28 Nicira, Inc. Management of advanced connection state during migration
US10432484B2 (en) 2016-06-13 2019-10-01 Silver Peak Systems, Inc. Aggregating select network traffic statistics
US10149193B2 (en) 2016-06-15 2018-12-04 At&T Intellectual Property I, L.P. Method and apparatus for dynamically managing network resources
US10289438B2 (en) 2016-06-16 2019-05-14 Cisco Technology, Inc. Techniques for coordination of application components deployed on distributed virtual machines
US10153973B2 (en) 2016-06-29 2018-12-11 Nicira, Inc. Installation of routing tables for logical router in route server mode
US10560320B2 (en) 2016-06-29 2020-02-11 Nicira, Inc. Ranking of gateways in cluster
US11082400B2 (en) 2016-06-29 2021-08-03 Nicira, Inc. Firewall configuration versioning
US11258761B2 (en) 2016-06-29 2022-02-22 Nicira, Inc. Self-service firewall configuration
US10200343B2 (en) 2016-06-29 2019-02-05 Nicira, Inc. Implementing logical network security on a hardware switch
US10708183B2 (en) 2016-07-21 2020-07-07 Cisco Technology, Inc. System and method of providing segment routing as a service
US9967056B1 (en) 2016-08-19 2018-05-08 Silver Peak Systems, Inc. Forward packet recovery with constrained overhead
CN114760183A (en) * 2016-08-27 2022-07-15 Nicira股份有限公司 Extension of network control systems into public clouds
US10484302B2 (en) 2016-08-27 2019-11-19 Nicira, Inc. Managed forwarding element executing in public cloud data compute node with different internal and external network addresses
US10341371B2 (en) 2016-08-31 2019-07-02 Nicira, Inc. Identifying and handling threats to data compute nodes in public cloud
US10938837B2 (en) 2016-08-30 2021-03-02 Nicira, Inc. Isolated network stack to manage security for virtual machines
US10333983B2 (en) 2016-08-30 2019-06-25 Nicira, Inc. Policy definition and enforcement for a network virtualization platform
US10454758B2 (en) 2016-08-31 2019-10-22 Nicira, Inc. Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP
US11895177B2 (en) * 2016-09-30 2024-02-06 Wisconsin Alumni Research Foundation State extractor for middlebox management system
US10341236B2 (en) 2016-09-30 2019-07-02 Nicira, Inc. Anycast edge service gateways
US10419394B2 (en) * 2016-10-24 2019-09-17 Nubeva, Inc. Providing scalable cloud-based security services
US10367623B2 (en) * 2016-10-31 2019-07-30 Cisco Technology, Inc. Data traffic management in virtual access point (VAP) enabled networks
US10284730B2 (en) 2016-11-01 2019-05-07 At&T Intellectual Property I, L.P. Method and apparatus for adaptive charging and performance in a software defined network
US10454836B2 (en) 2016-11-01 2019-10-22 At&T Intellectual Property I, L.P. Method and apparatus for dynamically adapting a software defined network
US10505870B2 (en) 2016-11-07 2019-12-10 At&T Intellectual Property I, L.P. Method and apparatus for a responsive software defined network
US10469376B2 (en) 2016-11-15 2019-11-05 At&T Intellectual Property I, L.P. Method and apparatus for dynamic network routing in a software defined network
US10972388B2 (en) 2016-11-22 2021-04-06 Cisco Technology, Inc. Federated microburst detection
US10193862B2 (en) 2016-11-29 2019-01-29 Vmware, Inc. Security policy analysis based on detecting new network port connections
US10039006B2 (en) 2016-12-05 2018-07-31 At&T Intellectual Property I, L.P. Method and system providing local data breakout within mobility networks
CN110168499B (en) 2016-12-06 2023-06-20 Nicira股份有限公司 Executing context-rich attribute-based services on a host
US10742746B2 (en) 2016-12-21 2020-08-11 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10237123B2 (en) 2016-12-21 2019-03-19 Nicira, Inc. Dynamic recovery from a split-brain failure in edge nodes
US10802857B2 (en) 2016-12-22 2020-10-13 Nicira, Inc. Collecting and processing contextual attributes on a host
US10616045B2 (en) 2016-12-22 2020-04-07 Nicira, Inc. Migration of centralized routing components of logical router
US11032246B2 (en) 2016-12-22 2021-06-08 Nicira, Inc. Context based firewall services for data message flows for multiple concurrent users on one machine
US10581960B2 (en) 2016-12-22 2020-03-03 Nicira, Inc. Performing context-rich attribute-based load balancing on a host
US10803173B2 (en) 2016-12-22 2020-10-13 Nicira, Inc. Performing context-rich attribute-based process control services on a host
US10805332B2 (en) 2017-07-25 2020-10-13 Nicira, Inc. Context engine model
US10812451B2 (en) 2016-12-22 2020-10-20 Nicira, Inc. Performing appID based firewall services on a host
US11537419B2 (en) * 2016-12-30 2022-12-27 Intel Corporation Virtual machine migration while maintaining live network links
US10951523B2 (en) * 2017-01-09 2021-03-16 Marvell Asia Pte, Ltd. Port extender with local switching
US11405335B2 (en) * 2017-01-13 2022-08-02 Nicira, Inc. Managing network traffic in virtual switches based on logical port identifiers
US10892978B2 (en) 2017-02-06 2021-01-12 Silver Peak Systems, Inc. Multi-level learning for classifying traffic flows from first packet data
US10257082B2 (en) 2017-02-06 2019-04-09 Silver Peak Systems, Inc. Multi-level learning for classifying traffic flows
US11044202B2 (en) 2017-02-06 2021-06-22 Silver Peak Systems, Inc. Multi-level learning for predicting and classifying traffic flows from first packet data
US10771394B2 (en) 2017-02-06 2020-09-08 Silver Peak Systems, Inc. Multi-level learning for classifying traffic flows on a first packet from DNS data
US10264075B2 (en) * 2017-02-27 2019-04-16 At&T Intellectual Property I, L.P. Methods, systems, and devices for multiplexing service information from sensor data
US10469286B2 (en) 2017-03-06 2019-11-05 At&T Intellectual Property I, L.P. Methods, systems, and devices for managing client devices using a virtual anchor manager
US10805239B2 (en) 2017-03-07 2020-10-13 Nicira, Inc. Visualization of path between logical network endpoints
US10708152B2 (en) 2017-03-23 2020-07-07 Cisco Technology, Inc. Predicting application and network performance
US10523512B2 (en) 2017-03-24 2019-12-31 Cisco Technology, Inc. Network agent for generating platform specific network policies
US10764141B2 (en) 2017-03-27 2020-09-01 Cisco Technology, Inc. Network agent for reporting to a network policy system
US10594560B2 (en) 2017-03-27 2020-03-17 Cisco Technology, Inc. Intent driven network policy platform
US10250446B2 (en) 2017-03-27 2019-04-02 Cisco Technology, Inc. Distributed policy store
US10873794B2 (en) 2017-03-28 2020-12-22 Cisco Technology, Inc. Flowlet resolution for application performance monitoring and management
US11463404B2 (en) * 2017-04-12 2022-10-04 Avaya Inc. Quarantined communications processing at a network edge
US20180302490A1 (en) * 2017-04-13 2018-10-18 Cisco Technology, Inc. Dynamic content delivery network (cdn) cache selection without request routing engineering
US10819606B2 (en) 2017-04-27 2020-10-27 At&T Intellectual Property I, L.P. Method and apparatus for selecting processing paths in a converged network
US10673751B2 (en) 2017-04-27 2020-06-02 At&T Intellectual Property I, L.P. Method and apparatus for enhancing services in a software defined network
US10212289B2 (en) 2017-04-27 2019-02-19 At&T Intellectual Property I, L.P. Method and apparatus for managing resources in a software defined network
US10749796B2 (en) 2017-04-27 2020-08-18 At&T Intellectual Property I, L.P. Method and apparatus for selecting processing paths in a software defined network
US10595215B2 (en) 2017-05-08 2020-03-17 Fortinet, Inc. Reducing redundant operations performed by members of a cooperative security fabric
US10382903B2 (en) 2017-05-09 2019-08-13 At&T Intellectual Property I, L.P. Multi-slicing orchestration system and method for service and/or content delivery
US10257668B2 (en) 2017-05-09 2019-04-09 At&T Intellectual Property I, L.P. Dynamic network slice-switching and handover system and method
WO2018217143A1 (en) * 2017-05-24 2018-11-29 Telefonaktiebolaget Lm Ericsson (Publ) Routing table selection in a policy based routing system
US20190020559A1 (en) * 2017-07-17 2019-01-17 Nicira, Inc. Distributed health check in virtualized computing environments
US10680887B2 (en) 2017-07-21 2020-06-09 Cisco Technology, Inc. Remote device status audit and recovery
US10070344B1 (en) 2017-07-25 2018-09-04 At&T Intellectual Property I, L.P. Method and system for managing utilization of slices in a virtual network function environment
US11570092B2 (en) 2017-07-31 2023-01-31 Nicira, Inc. Methods for active-active stateful network service cluster
US11296984B2 (en) 2017-07-31 2022-04-05 Nicira, Inc. Use of hypervisor for active-active stateful network service cluster
CN107491340B (en) * 2017-07-31 2020-07-14 上海交通大学 Method for realizing huge virtual machine crossing physical machines
US10567482B2 (en) 2017-08-24 2020-02-18 Nicira, Inc. Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table
US10491516B2 (en) 2017-08-24 2019-11-26 Nicira, Inc. Packet communication between logical networks and public cloud service providers native networks using a single network interface and a single routing table
EP3673627B1 (en) 2017-08-27 2023-09-13 Nicira, Inc. Performing in-line service in public cloud
US10652281B1 (en) * 2017-08-31 2020-05-12 Vmware, Inc. Network policy implementation in a tag-based policy architecture
US10516650B2 (en) 2017-09-13 2019-12-24 Netabstraction, Inc. Dynamic, user-configurable virtual private network
US11212210B2 (en) 2017-09-21 2021-12-28 Silver Peak Systems, Inc. Selective route exporting using source type
US10437647B2 (en) * 2017-09-26 2019-10-08 Verizon Patent And Licensing Inc. Cluster configuration with zero touch provisioning
US10116671B1 (en) * 2017-09-28 2018-10-30 International Business Machines Corporation Distributed denial-of-service attack detection based on shared network flow information
US10506560B2 (en) * 2017-10-04 2019-12-10 Huawei Technologies Co., Ltd. Method and apparatus for control layer communication between network nodes having multiple interfaces
US10608887B2 (en) 2017-10-06 2020-03-31 Nicira, Inc. Using packet tracing tool to automatically execute packet capture operations
US20200267051A1 (en) * 2017-10-06 2020-08-20 Telefonaktiebolaget Lm Ericsson (Publ) Remotely controlling network slices in a network
US10554501B2 (en) 2017-10-23 2020-02-04 Cisco Technology, Inc. Network migration assistant
CN107949019B (en) * 2017-10-24 2021-09-21 上海连尚网络科技有限公司 Load balancing method of wireless access point
US10523541B2 (en) 2017-10-25 2019-12-31 Cisco Technology, Inc. Federated network and application data analytics platform
US10594542B2 (en) 2017-10-27 2020-03-17 Cisco Technology, Inc. System and method for network root cause analysis
US10511459B2 (en) 2017-11-14 2019-12-17 Nicira, Inc. Selection of managed forwarding element for bridge spanning multiple datacenters
US10374827B2 (en) 2017-11-14 2019-08-06 Nicira, Inc. Identifier that maps to different networks at different datacenters
US11012420B2 (en) 2017-11-15 2021-05-18 Nicira, Inc. Third-party service chaining using packet encapsulation in a flow-based forwarding element
US10778651B2 (en) 2017-11-15 2020-09-15 Nicira, Inc. Performing context-rich attribute-based encryption on a host
US10841192B1 (en) * 2017-11-29 2020-11-17 Riverbed Technology, Inc. Estimating data transfer performance improvement that is expected to be achieved by a network optimization device
US10805420B2 (en) * 2017-11-29 2020-10-13 Forcepoint Llc Proxy-less wide area network acceleration
US10887131B1 (en) * 2017-11-29 2021-01-05 Riverbed Technology, Inc. High availability (HA) network device
US10601705B2 (en) * 2017-12-04 2020-03-24 Nicira, Inc. Failover of centralized routers in public cloud logical networks
US10862753B2 (en) 2017-12-04 2020-12-08 Nicira, Inc. High availability for stateful services in public cloud logical networks
US10104548B1 (en) 2017-12-18 2018-10-16 At&T Intellectual Property I, L.P. Method and apparatus for dynamic instantiation of virtual service slices for autonomous machines
US10523748B2 (en) * 2017-12-22 2019-12-31 A10 Networks, Inc. Managing health status of network devices in a distributed global server load balancing system
US10616321B2 (en) 2017-12-22 2020-04-07 At&T Intellectual Property I, L.P. Distributed stateful load balancer
US10791019B2 (en) * 2017-12-28 2020-09-29 Intel Corporation Edge or fog gateway assisted out-of-band remote management for managed client devices
US11233821B2 (en) 2018-01-04 2022-01-25 Cisco Technology, Inc. Network intrusion counter-intelligence
US10574575B2 (en) 2018-01-25 2020-02-25 Cisco Technology, Inc. Network flow stitching using middle box flow stitching
US10826803B2 (en) 2018-01-25 2020-11-03 Cisco Technology, Inc. Mechanism for facilitating efficient policy updates
US10999149B2 (en) 2018-01-25 2021-05-04 Cisco Technology, Inc. Automatic configuration discovery based on traffic flow data
US10798015B2 (en) * 2018-01-25 2020-10-06 Cisco Technology, Inc. Discovery of middleboxes using traffic flow stitching
US10659252B2 (en) 2018-01-26 2020-05-19 Nicira, Inc Specifying and utilizing paths through a network
US10802893B2 (en) 2018-01-26 2020-10-13 Nicira, Inc. Performing process control services on endpoint machines
US11128700B2 (en) 2018-01-26 2021-09-21 Cisco Technology, Inc. Load balancing configuration based on traffic flow telemetry
US10862773B2 (en) 2018-01-26 2020-12-08 Nicira, Inc. Performing services on data messages associated with endpoint machines
US10044691B1 (en) 2018-02-12 2018-08-07 Symantec Corporation Decrypting network traffic on a middlebox device using a trusted execution environment
US11153122B2 (en) 2018-02-19 2021-10-19 Nicira, Inc. Providing stateful services deployed in redundant gateways connected to asymmetric network
US10637721B2 (en) 2018-03-12 2020-04-28 Silver Peak Systems, Inc. Detecting path break conditions while minimizing network overhead
TWI668973B (en) * 2018-03-23 2019-08-11 中華電信股份有限公司 Schedulable security protection system based on software-defined network and method thereof
US10728174B2 (en) 2018-03-27 2020-07-28 Nicira, Inc. Incorporating layer 2 service between two interfaces of gateway device
US11349587B2 (en) * 2018-03-30 2022-05-31 Intel Corporation Generating a timestamp
US11063903B2 (en) * 2018-04-11 2021-07-13 Vmware, Inc. Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels
US10742503B2 (en) * 2018-05-02 2020-08-11 Nicira, Inc. Application of setting profiles to groups of logical network entities
US10749751B2 (en) * 2018-05-02 2020-08-18 Nicira, Inc. Application of profile setting groups to logical network entities
JP6981367B2 (en) * 2018-06-04 2021-12-15 日本電信電話株式会社 Network system and network bandwidth control management method
US10942788B2 (en) 2018-06-15 2021-03-09 Vmware, Inc. Policy constraint framework for an sddc
US10812337B2 (en) 2018-06-15 2020-10-20 Vmware, Inc. Hierarchical API for a SDDC
US11343229B2 (en) 2018-06-28 2022-05-24 Vmware, Inc. Managed forwarding element detecting invalid packet addresses
US10826770B2 (en) * 2018-07-26 2020-11-03 Cisco Technology, Inc. Synthesis of models for networks using automated boolean learning
US11374794B2 (en) 2018-08-24 2022-06-28 Vmware, Inc. Transitive routing in public cloud
US11196591B2 (en) 2018-08-24 2021-12-07 Vmware, Inc. Centralized overlay gateway in public cloud
WO2020044334A1 (en) * 2018-08-27 2020-03-05 Drivenets Ltd. A system and a method for using a network cloud software
US10708082B1 (en) * 2018-08-31 2020-07-07 Juniper Networks, Inc. Unified control plane for nested clusters in a virtualized computing infrastructure
US11595250B2 (en) 2018-09-02 2023-02-28 Vmware, Inc. Service insertion at logical network gateway
US10944673B2 (en) 2018-09-02 2021-03-09 Vmware, Inc. Redirection of data messages at logical network gateway
KR102160187B1 (en) 2018-11-20 2020-09-25 광주과학기술원 Apparatus and method deploying firewall on SDN, and network using the same
US10931560B2 (en) 2018-11-23 2021-02-23 Vmware, Inc. Using route type to determine routing protocol behavior
GB2579233A (en) * 2018-11-27 2020-06-17 Edwards Ltd A method relating to controllers of a vacuum pumping and/or abatement system
US10797998B2 (en) 2018-12-05 2020-10-06 Vmware, Inc. Route server for distributed routers using hierarchical routing protocol
US10938788B2 (en) 2018-12-12 2021-03-02 Vmware, Inc. Static routes for policy-based VPN
US11070475B2 (en) * 2018-12-13 2021-07-20 Google Llc Transparent migration of virtual network functions
CN109726592B (en) * 2018-12-31 2021-02-23 联动优势科技有限公司 Data sandbox processing method and device
CN109726593B (en) * 2018-12-31 2021-02-23 联动优势科技有限公司 Method and device for realizing data sandbox
US10979314B2 (en) 2019-01-24 2021-04-13 Vmware, Inc. Dynamic inter-cloud placement of virtual network functions for a slice
US10944647B2 (en) 2019-01-24 2021-03-09 Vmware, Inc. Dynamic inter-cloud placement of virtual network functions for a slice
US11024144B2 (en) * 2019-02-22 2021-06-01 Vmware, Inc. Redirecting traffic from mobile device to initial slice selector for connection
US11146964B2 (en) 2019-02-22 2021-10-12 Vmware, Inc. Hierarchical network slice selection
US11483762B2 (en) 2019-02-22 2022-10-25 Vmware, Inc. Virtual service networks
US11246087B2 (en) 2019-02-22 2022-02-08 Vmware, Inc. Stateful network slice selection using slice selector as connection termination proxy
CN111641515B (en) * 2019-03-01 2021-11-19 华为技术有限公司 VNF life cycle management method and device
US11310202B2 (en) 2019-03-13 2022-04-19 Vmware, Inc. Sharing of firewall rules among multiple workloads in a hypervisor
US10880159B1 (en) * 2019-03-18 2020-12-29 Amazon Technologies, Inc. Centralized access of configuration data for computing resources
US10897423B2 (en) 2019-05-14 2021-01-19 Vmware, Inc. Congestion avoidance in a slice-based network
US10958579B2 (en) 2019-05-14 2021-03-23 Vmware, Inc. Congestion avoidance in a slice-based network
US11012288B2 (en) 2019-05-14 2021-05-18 Vmware, Inc. Congestion avoidance in a slice-based network
US11588733B2 (en) 2019-05-14 2023-02-21 Vmware, Inc. Slice-based routing
US10892994B2 (en) 2019-05-14 2021-01-12 Vmware, Inc. Quality of service in virtual service networks
CN110134495B (en) * 2019-05-21 2022-08-12 山东大学 Container cross-host online migration method, storage medium and terminal equipment
US10652081B1 (en) * 2019-06-24 2020-05-12 Capital One Services, Llc Facilitating resilient and fault tolerant asynchronous messaging
US11563722B2 (en) * 2019-08-22 2023-01-24 Hewlett Packard Enterprise Development Lp Firewall coordination in a network
US11057348B2 (en) * 2019-08-22 2021-07-06 Saudi Arabian Oil Company Method for data center network segmentation
US11108643B2 (en) 2019-08-26 2021-08-31 Vmware, Inc. Performing ingress side control through egress side limits on forwarding elements
US11153119B2 (en) 2019-10-15 2021-10-19 Cisco Technology, Inc. Dynamic discovery of peer network devices across a wide area network
CN111092876B (en) * 2019-12-12 2021-10-01 北京首都在线科技股份有限公司 Multi-host system, electronic device, storage medium, information processing method and apparatus for multi-host system
US11539718B2 (en) 2020-01-10 2022-12-27 Vmware, Inc. Efficiently performing intrusion detection
US11283699B2 (en) 2020-01-17 2022-03-22 Vmware, Inc. Practical overlay network latency measurement in datacenter
US11599395B2 (en) 2020-02-19 2023-03-07 Vmware, Inc. Dynamic core allocation
CN116761208A (en) * 2020-03-17 2023-09-15 华为技术有限公司 Message processing method, device, equipment and storage medium
EP4078901A4 (en) 2020-04-01 2023-10-11 VMWare, Inc. Auto deploying network elements for heterogeneous compute elements
US11374850B2 (en) 2020-04-06 2022-06-28 Vmware, Inc. Tunnel endpoint group records
US11438238B2 (en) 2020-04-06 2022-09-06 Vmware, Inc. User interface for accessing multi-site logical network
US11088902B1 (en) 2020-04-06 2021-08-10 Vmware, Inc. Synchronization of logical network state between global and local managers
US11777793B2 (en) 2020-04-06 2023-10-03 Vmware, Inc. Location criteria for security groups
US11522834B2 (en) 2020-04-11 2022-12-06 Juniper Networks, Inc. Autotuning a virtual firewall
US11425043B2 (en) * 2020-06-16 2022-08-23 T-Mobile Usa, Inc. Duplex load balancing for massive IoT applications
US11616755B2 (en) * 2020-07-16 2023-03-28 Vmware, Inc. Facilitating distributed SNAT service
US11606294B2 (en) 2020-07-16 2023-03-14 Vmware, Inc. Host computer configured to facilitate distributed SNAT service
US11108728B1 (en) 2020-07-24 2021-08-31 Vmware, Inc. Fast distribution of port identifiers for rule processing
US11611613B2 (en) 2020-07-24 2023-03-21 Vmware, Inc. Policy-based forwarding to a load balancer of a load balancing cluster
US11451413B2 (en) 2020-07-28 2022-09-20 Vmware, Inc. Method for advertising availability of distributed gateway service and machines at host computer
US11902050B2 (en) 2020-07-28 2024-02-13 VMware LLC Method for providing distributed gateway service at host computer
US11570090B2 (en) 2020-07-29 2023-01-31 Vmware, Inc. Flow tracing operation in container cluster
US11558426B2 (en) 2020-07-29 2023-01-17 Vmware, Inc. Connection tracking for container cluster
US11196628B1 (en) 2020-07-29 2021-12-07 Vmware, Inc. Monitoring container clusters
US11803408B2 (en) 2020-07-29 2023-10-31 Vmware, Inc. Distributed network plugin agents for container networking
US11863352B2 (en) 2020-07-30 2024-01-02 Vmware, Inc. Hierarchical networking for nested container clusters
US11539633B2 (en) * 2020-08-31 2022-12-27 Vmware, Inc. Determining whether to rate limit traffic
US11875172B2 (en) 2020-09-28 2024-01-16 VMware LLC Bare metal computer for booting copies of VM images on multiple computing devices using a smart NIC
US11606310B2 (en) 2020-09-28 2023-03-14 Vmware, Inc. Flow processing offload using virtual port identifiers
US20220103430A1 (en) 2020-09-28 2022-03-31 Vmware, Inc. Defining logical networks for deploying applications
US11474880B2 (en) * 2020-10-19 2022-10-18 Pensando Systems Inc. Network state synchronization for workload migrations in edge devices
US11637737B2 (en) * 2020-10-23 2023-04-25 Dell Products L.P. Network data management framework
US11909721B2 (en) 2020-12-29 2024-02-20 Mastercard International Incorporated Systems and methods for automated firewall provisioning for virtual machines
US11736436B2 (en) 2020-12-31 2023-08-22 Vmware, Inc. Identifying routes with indirect addressing in a datacenter
US11336533B1 (en) 2021-01-08 2022-05-17 Vmware, Inc. Network visualization of correlations between logical elements and associated physical elements
US11836551B2 (en) 2021-03-05 2023-12-05 Vmware, Inc. Active and standby RICs
US20220283840A1 (en) 2021-03-05 2022-09-08 Vmware, Inc. Configuring direct access to hardware accelerator in an o-ran system
US11700179B2 (en) 2021-03-26 2023-07-11 Vmware, Inc. Configuration of logical networking entities
US11799784B2 (en) 2021-06-08 2023-10-24 Vmware, Inc. Virtualized QoS support in software defined networks
US11606254B2 (en) 2021-06-11 2023-03-14 Vmware, Inc. Automatic configuring of VLAN and overlay logical switches for container secondary interfaces
US11687210B2 (en) 2021-07-05 2023-06-27 Vmware, Inc. Criteria-based expansion of group nodes in a network topology visualization
US11477270B1 (en) 2021-07-06 2022-10-18 Vmware, Inc. Seamless hand-off of data traffic in public cloud environments
US11711278B2 (en) 2021-07-24 2023-07-25 Vmware, Inc. Visualization of flow trace operation across multiple sites
CN113965347B (en) * 2021-09-09 2024-03-15 山石网科通信技术股份有限公司 Firewall data processing method and device
US11855862B2 (en) 2021-09-17 2023-12-26 Vmware, Inc. Tagging packets for monitoring and analysis
CN113612807B (en) * 2021-10-09 2021-12-03 苏州浪潮智能科技有限公司 Distributed firewall definition method and system
US11936621B2 (en) * 2021-11-19 2024-03-19 The Bank Of New York Mellon Firewall drift monitoring and detection
US20230216736A1 (en) * 2021-12-30 2023-07-06 King Fahd University Of Petroleum And Minerals Distributed software-defined networking (sdn) control plane framework
US11799761B2 (en) 2022-01-07 2023-10-24 Vmware, Inc. Scaling edge services with minimal disruption
US20230231741A1 (en) 2022-01-14 2023-07-20 Vmware, Inc. Per-namespace ip address management method for container networks
CN114629790B (en) * 2022-03-11 2023-06-06 苏州浪潮智能科技有限公司 Method and system for configuring server network cluster
US11928367B2 (en) 2022-06-21 2024-03-12 VMware LLC Logical memory addressing for network devices
US11928062B2 (en) 2022-06-21 2024-03-12 VMware LLC Accelerating data message classification with smart NICs
US11899594B2 (en) 2022-06-21 2024-02-13 VMware LLC Maintenance of data message classification cache on smart NIC
WO2024037924A1 (en) * 2022-08-18 2024-02-22 Signify Holding B.V. A method for migrating nodes in a distributed network to a centralized network
US11848910B1 (en) 2022-11-11 2023-12-19 Vmware, Inc. Assigning stateful pods fixed IP addresses depending on unique pod identity
US11870695B1 (en) * 2022-12-16 2024-01-09 Microsoft Technology Licensing, Llc Virtual machine migration on hypervisor network
US11838176B1 (en) 2022-12-19 2023-12-05 Vmware, Inc. Provisioning and deploying RAN applications in a RAN system
US11831511B1 (en) 2023-01-17 2023-11-28 Vmware, Inc. Enforcing network policies in heterogeneous systems

Citations (153)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5504921A (en) 1990-09-17 1996-04-02 Cabletron Systems, Inc. Network management system using model-based intelligence
US5550816A (en) 1994-12-29 1996-08-27 Storage Technology Corporation Method and apparatus for virtual switching
US5751967A (en) 1994-07-25 1998-05-12 Bay Networks Group, Inc. Method and apparatus for automatically configuring a network device to support a virtual network
WO1999018534A3 (en) 1997-10-06 1999-09-16 Web Balance Inc System for balancing loads among network servers
US6104699A (en) 1994-06-13 2000-08-15 Telefonaktiebolget Lm Ericsson Method and device for partitioning physical network resources
US6353614B1 (en) 1998-03-05 2002-03-05 3Com Corporation Method and protocol for distributed network address translation
US20020093952A1 (en) 2000-06-30 2002-07-18 Gonda Rumi Sheryar Method for managing circuits in a multistage cross connect
US20020161867A1 (en) 2001-04-25 2002-10-31 Cochran Charles W. System and method for remote discovery and configuration of a network device
US20020194369A1 (en) 2001-03-20 2002-12-19 Worldcom, Inc. Policy-based synchronization of per-class resources between routers in a data network
US6512745B1 (en) 1996-03-08 2003-01-28 Hitachi, Ltd. Packet switching network, packet switching equipment, and network management equipment
US6539432B1 (en) 1998-05-19 2003-03-25 Hitachi, Ltd. Network manager, nodes and network management system
US20030069972A1 (en) 2001-10-10 2003-04-10 Yutaka Yoshimura Computer resource allocating method
US20030093481A1 (en) 2001-11-09 2003-05-15 Julian Mitchell Middlebox control
JP2003318949A (en) 2002-04-19 2003-11-07 Nippon Telegr & Teleph Corp <Ntt> Vpn system and router
US6680934B1 (en) 1999-12-02 2004-01-20 Nortel Networks Limited System, device and method for expediting control flow in a communication system
US20040049701A1 (en) 2002-09-05 2004-03-11 Jean-Francois Le Pennec Firewall system for interconnecting two IP networks managed by two different administrative entities
US20040054793A1 (en) 2002-09-16 2004-03-18 Richard Coleman System and method for high performance shared web hosting
US20040098505A1 (en) 2002-11-20 2004-05-20 Clemmensen Daniel G. Forwarding system with multiple logical sub-system functionality
US6785843B1 (en) 2001-02-23 2004-08-31 Mcrae Andrew Data plane restart without state change in a control plane of an intermediate network node
US20050021683A1 (en) 2003-03-27 2005-01-27 Chris Newton Method and apparatus for correlating network activity through visualizing network data
US20050018669A1 (en) 2003-07-25 2005-01-27 International Business Machines Corporation Infiniband subnet management queue pair emulation for multiple logical ports on a single physical port
US20050050377A1 (en) 2003-08-25 2005-03-03 Chan Chun Kin Brink of failure and breach of security detection and recovery system
US6880089B1 (en) 2000-03-31 2005-04-12 Avaya Technology Corp. Firewall clustering for multiple network servers
US20050083953A1 (en) 2003-10-17 2005-04-21 Ip Infusion Inc., A Delaware Corporation System and method for providing redundant routing capabilities for a network node
US20050132030A1 (en) 2003-12-10 2005-06-16 Aventail Corporation Network appliance
US20050249199A1 (en) 1999-07-02 2005-11-10 Cisco Technology, Inc., A California Corporation Load balancing using distributed forwarding agents with application based feedback for different virtual machines
WO2005112390A1 (en) 2004-05-12 2005-11-24 Alcatel Automated containment of network intruder
US20060092976A1 (en) 2004-11-01 2006-05-04 Lucent Technologies Inc. Softrouter separate control network
US7055173B1 (en) 1997-12-19 2006-05-30 Avaya Technology Corp. Firewall pooling in a network flowswitch
US20060221961A1 (en) 2005-04-01 2006-10-05 International Business Machines Corporation Network communications for operating system partitions
US7197572B2 (en) 2002-05-06 2007-03-27 Qlogic, Corporation System and method for implementing logical switches in a network system
US7209439B2 (en) 2001-03-20 2007-04-24 Mci, Llc Pool-based resource management in a data network
US20070140128A1 (en) 2001-11-02 2007-06-21 Eric Klinker System and method to provide routing control of information over networks
US20070233838A1 (en) 2006-03-30 2007-10-04 Hitachi, Ltd. Method for workload management of plural servers
US7283473B2 (en) 2003-04-10 2007-10-16 International Business Machines Corporation Apparatus, system and method for providing multiple logical channel adapters within a single physical channel adapter in a system area network
US20070266433A1 (en) 2006-03-03 2007-11-15 Hezi Moore System and Method for Securing Information in a Virtual Computing Environment
US20070283348A1 (en) 2006-05-15 2007-12-06 White Anthony R P Method and system for virtual machine migration
US20070286185A1 (en) 2003-12-22 2007-12-13 Anders Eriksson Control of Mobile Packet Streams
US20080005293A1 (en) 2006-06-30 2008-01-03 Telefonaktiebolaget Lm Ericsson (Publ) Router and method for server load balancing
US20080002579A1 (en) 2004-12-21 2008-01-03 Fredrik Lindholm Arrangement and a Method Relating to Flow of Packets in Communication Systems
US20080049621A1 (en) 2004-12-31 2008-02-28 Mcguire Alan Connection-Oriented Communications Scheme For Connection-Less Communications Traffic
US7342916B2 (en) 2003-09-10 2008-03-11 Intel Corporation Method, apparatus and system for optimizing routing of mobile IP packets
US20080071900A1 (en) 2005-03-16 2008-03-20 Wavestorm Device and a method for communicating in a network
US20080072305A1 (en) 2006-09-14 2008-03-20 Ouova, Inc. System and method of middlebox detection and characterization
US20080163207A1 (en) 2007-01-03 2008-07-03 International Business Machines Corporation Moveable access control list (acl) mechanisms for hypervisors and virtual machines and virtual port firewalls
US20080189769A1 (en) 2007-02-01 2008-08-07 Martin Casado Secure network switching infrastructure
US20080186990A1 (en) 2007-02-02 2008-08-07 International Business Machines Corporation Translation module, method and computer program product for providing multiple infiniband address support for vm migration using infiniband address translation
US20080196100A1 (en) 2007-02-14 2008-08-14 Sajeev Madhavan Network monitoring
US20080205377A1 (en) 2007-02-22 2008-08-28 Blade Network Technologies, Inc. System and methods for providing server virtualization assistance
US20080225853A1 (en) 2007-02-14 2008-09-18 Melman David Logical bridging system and method
US20080240122A1 (en) 2007-03-27 2008-10-02 Richardson David R Configuring intercommunications between computing nodes
US7450598B2 (en) 2003-12-15 2008-11-11 At&T Intellectual Property I, L.P. System and method to provision MPLS/VPN network
US7478173B1 (en) 2003-12-18 2009-01-13 Wmware, Inc. Method and system for sharing a network connection in a virtual computer system
US20090063750A1 (en) 2007-08-27 2009-03-05 International Business Machines Corporation Migrating contents of a memory on a virtual machine
US20090083445A1 (en) 2007-09-24 2009-03-26 Ganga Ilango S Method and system for virtual port communications
US7512744B2 (en) 2001-12-28 2009-03-31 Network Appliance, Inc. Technique for enabling multiple virtual filers on a single filer to participate in multiple address spaces with overlapping network addresses
US20090092137A1 (en) 2007-10-03 2009-04-09 Virtela Communications, Inc. Virtualized application acceleration infrastructure
US20090122710A1 (en) 2007-11-08 2009-05-14 Chen Bar-Tor Event correlation using network data flow simulation over unmanaged network segments
US20090129271A1 (en) 2007-11-19 2009-05-21 Rajesh Ramankutty Providing services to packet flows in a network
US20090150527A1 (en) 2007-12-10 2009-06-11 Sun Microsystems, Inc. Method and system for reconfiguring a virtual network path
US20090161547A1 (en) 2007-12-20 2009-06-25 Packeteer, Inc. Compression Mechanisms for Control Plane-Data Plane Processing Architectures
US7555002B2 (en) 2003-11-06 2009-06-30 International Business Machines Corporation Infiniband general services queue pair virtualization for multiple logical ports on a single physical port
US20090199177A1 (en) 2004-10-29 2009-08-06 Hewlett-Packard Development Company, L.P. Virtual computing infrastructure
US20090240924A1 (en) 2008-03-24 2009-09-24 Fujitsu Limited Information processing device, information processing method, and computer product
US20090249473A1 (en) 2008-03-31 2009-10-01 Cohn Daniel T Authorizing communications between computing nodes
US20090249470A1 (en) 2008-03-27 2009-10-01 Moshe Litvin Combined firewalls
US7606260B2 (en) 2003-03-31 2009-10-20 Fujitsu Limited Virtual path configuration apparatus, virtual path configuration method, and computer product
US20090292858A1 (en) 2008-05-23 2009-11-26 Vmware, Inc. Distributed Virtual Switch for Virtualized Computer Systems
US7627692B2 (en) 2004-01-30 2009-12-01 Nokia Corporation Multiplexing of compressed control and user-plane messages
US20090300210A1 (en) 2008-05-28 2009-12-03 James Michael Ferris Methods and systems for load balancing in cloud-based networks
US20090303880A1 (en) 2008-06-09 2009-12-10 Microsoft Corporation Data center interconnect and traffic engineering
EP1653688B1 (en) 2004-11-01 2009-12-23 Lucent Technologies Inc. Softrouter protocol disaggregation
US20090327781A1 (en) 2008-06-30 2009-12-31 Sun Microsystems, Inc. Method and system for power management in a virtual machine environment without disrupting network connectivity
US7649851B2 (en) 2005-11-11 2010-01-19 Hitachi, Ltd. Virtual network management method, virtual network management program, virtual network management system, and virtual network means
US20100046531A1 (en) 2007-02-02 2010-02-25 Groupe Des Ecoles Des Telecommunications (Get) Institut National Des Telecommunications (Int) Autonomic network node system
US20100046530A1 (en) 2006-12-12 2010-02-25 Jani Hautakorpi IP Address Distribution in Middleboxes
US7706266B2 (en) 2007-03-12 2010-04-27 Citrix Systems, Inc. Systems and methods of providing proxy-based quality of service
US7710874B2 (en) 2003-06-04 2010-05-04 International Business Machines Corporation System and method for automatic management of many computer data processing system pipes
US20100115080A1 (en) * 2008-11-06 2010-05-06 Kageyama Soshi Method of controlling the communication between a machine using private addresses and a communication device connected to a global network
US20100115101A1 (en) 2008-03-07 2010-05-06 Antonio Lain Distributed network connection policy management
US20100125667A1 (en) 2008-11-19 2010-05-20 Vmware, Inc. Dynamic configuration of virtual machines
US20100131636A1 (en) 2008-11-24 2010-05-27 Vmware, Inc. Application delivery control module for virtual network switch
US7730486B2 (en) 2005-02-28 2010-06-01 Hewlett-Packard Development Company, L.P. System and method for migrating virtual machines on cluster systems
US20100138830A1 (en) 2008-05-02 2010-06-03 Skytap Multitenant hosted virtual machine infrastructure
US20100153554A1 (en) 2008-12-15 2010-06-17 Thomas Anschutz Method and apparatus for providing network virtualization
US20100165876A1 (en) * 2008-12-30 2010-07-01 Amit Shukla Methods and apparatus for distributed dynamic network provisioning
US20100165877A1 (en) 2008-12-30 2010-07-01 Amit Shukla Methods and apparatus for distributed dynamic network provisioning
US7764599B2 (en) 2006-06-01 2010-07-27 Alaxala Networks Corporation Network routing device and network routing method
US20100214949A1 (en) 2009-02-23 2010-08-26 Cisco Technology, Inc. Distributed data center access switch
US7792987B1 (en) 2003-04-21 2010-09-07 Juniper Networks, Inc. Supporting virtual private networks using a first network topology for forwarding and a subset of the first network topology or a smaller topology for signaling
US7808929B2 (en) 2008-09-30 2010-10-05 Oracle America, Inc. Efficient ACL lookup algorithms
US20100254385A1 (en) 2009-04-07 2010-10-07 Cisco Technology, Inc. Service Insertion Architecture (SIA) in a Virtual Private Network (VPN) Aware Network
US20100257263A1 (en) 2009-04-01 2010-10-07 Nicira Networks, Inc. Method and apparatus for implementing and managing virtual switches
US7818452B2 (en) 2000-09-13 2010-10-19 Fortinet, Inc. Distributed virtual system to support managed, network-based services
US7826482B1 (en) 2006-11-17 2010-11-02 Juniper Networks, Inc. Service-specific forwarding in an LDP-RSVP hybrid network
US20100287548A1 (en) 2009-05-06 2010-11-11 Vmware, Inc. Long Distance Virtual Machine Migration
US7839847B2 (en) 2006-05-08 2010-11-23 Cisco Technology, Inc. Methods and apparatus providing VPN traffic matrix construction
US7856549B2 (en) 2007-01-24 2010-12-21 Hewlett-Packard Development Company, L.P. Regulating power consumption
US20100322255A1 (en) 2009-06-22 2010-12-23 Alcatel-Lucent Usa Inc. Providing cloud-based services using dynamic network virtualization
US20110022695A1 (en) 2009-07-27 2011-01-27 Vmware, Inc. Management and Implementation of Enclosed Local Networks in a Virtual Lab
US7885276B1 (en) 2008-09-30 2011-02-08 Emc Corporation Isolating network traffic in multi-tenant virtualization environments
US20110075674A1 (en) 2009-09-30 2011-03-31 Alcatel-Lucent Usa Inc. Scalable architecture for enterprise extension in a cloud topology
US7925850B1 (en) 2007-02-16 2011-04-12 Vmware, Inc. Page signature disambiguation for increasing the efficiency of virtual machine migration in shared-page virtualized computer systems
US20110085559A1 (en) 2009-10-08 2011-04-14 Brocade Communications Systems, Inc. Transit Switches in a Network of Logical Switches
US7936770B1 (en) 2005-03-08 2011-05-03 Enterasys Networks, Inc. Method and apparatus of virtual class of service and logical queue representation through network traffic distribution over multiple port interfaces
US7937438B1 (en) 2009-12-07 2011-05-03 Amazon Technologies, Inc. Using virtual networking devices to manage external connections
US7948986B1 (en) 2009-02-02 2011-05-24 Juniper Networks, Inc. Applying services within MPLS networks
US7953865B1 (en) 2009-12-28 2011-05-31 Amazon Technologies, Inc. Using virtual networking devices to manage routing communications between connected computer networks
US7991859B1 (en) 2009-12-28 2011-08-02 Amazon Technologies, Inc. Using virtual networking devices to connect managed computer networks
US7995483B1 (en) 2009-01-20 2011-08-09 Juniper Networks, Inc. Simultaneously testing connectivity to multiple remote maintenance endpoints of the same maintenance association
US20110225594A1 (en) 2010-03-15 2011-09-15 International Business Machines Corporation Method and Apparatus for Determining Resources Consumed by Tasks
US8027354B1 (en) 2009-04-29 2011-09-27 Cisco Technology, Inc. Network consolidation for virtualized servers
US8031633B2 (en) 2007-08-13 2011-10-04 Honeywell International Inc. Virtual network architecture for space data processing
US20110261825A1 (en) 2009-03-09 2011-10-27 Nec Corporation OpenFlow COMMUNICATION SYSTEM AND OpenFlow COMMUNICATION METHOD
US8054832B1 (en) 2008-12-30 2011-11-08 Juniper Networks, Inc. Methods and apparatus for routing between virtual resources based on a routing location policy
US8060875B1 (en) 2006-05-26 2011-11-15 Vmware, Inc. System and method for multiple virtual teams
US20110299534A1 (en) 2010-06-08 2011-12-08 Brocade Communications Systems, Inc. Virtual port grouping for virtual cluster switching
US20110310899A1 (en) 2010-06-22 2011-12-22 Microsoft Corporation Distributed Virtual Network Gateways
US20120014386A1 (en) 2010-06-29 2012-01-19 Futurewei Technologies, Inc. Delegate Gateways and Proxy for Target Hosts in Large Layer 2 and Address Resolution with Duplicated Internet Protocol Addresses
US8149737B2 (en) 2005-08-09 2012-04-03 Motorola Solutions, Inc. Method and system for data transmission in a wireless network
WO2012051884A1 (en) 2010-10-19 2012-04-26 中兴通讯股份有限公司 Method and system for realizing virtual machine mobility
US20120144014A1 (en) 2010-12-01 2012-06-07 Cisco Technology, Inc. Directing data flows in data centers with clustering services
US8199750B1 (en) 2007-12-18 2012-06-12 World Wide Packets, Inc. Communicating with a control plane using a forwarding information format and control plane processing of packets devoid of a virtual switch identifier
US20120155266A1 (en) 2010-12-17 2012-06-21 Microsoft Corporation Synchronizing state among load balancer components
US8224971B1 (en) 2009-12-28 2012-07-17 Amazon Technologies, Inc. Using virtual networking devices and routing information to initiate external actions
US8224931B1 (en) 2010-03-31 2012-07-17 Amazon Technologies, Inc. Managing use of intermediate destination computing nodes for provided computer networks
US8265075B2 (en) 2009-03-16 2012-09-11 International Business Machines Corporation Method and apparatus for managing, configuring, and controlling an I/O virtualization device through a network switch
US20120236734A1 (en) 2011-03-16 2012-09-20 Juniper Networks, Inc. Packet loss measurement at service endpoints of a virtual private lan service
US20120246637A1 (en) 2011-03-22 2012-09-27 Cisco Technology, Inc. Distributed load balancer in a virtual machine environment
US20120281540A1 (en) 2011-05-03 2012-11-08 Cisco Technology, Inc. Mobile service routing in a network environment
US8339959B1 (en) 2008-05-20 2012-12-25 Juniper Networks, Inc. Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US8339994B2 (en) 2009-08-27 2012-12-25 Brocade Communications Systems, Inc. Defining an optimal topology for a group of logical switches
US20130073743A1 (en) 2011-09-19 2013-03-21 Cisco Technology, Inc. Services controlled session based flow interceptor
US20130074181A1 (en) 2011-09-19 2013-03-21 Cisco Technology, Inc. Auto Migration of Services Within a Virtual Data Center
US20130121209A1 (en) 2011-11-15 2013-05-16 Nicira, Inc. Wan optimizer for logical networks
US8456984B2 (en) 2010-07-19 2013-06-04 Ciena Corporation Virtualized shared protection capacity
US8468548B2 (en) 2010-12-17 2013-06-18 Microsoft Corporation Multi-tenant, high-density container service for hosting stateful and stateless middleware components
US8473557B2 (en) 2010-08-24 2013-06-25 At&T Intellectual Property I, L.P. Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US20130163475A1 (en) 2011-12-22 2013-06-27 Ludovic Beliveau Controller for flexible and extensible flow processing in software-defined networks
US20130163594A1 (en) 2011-12-21 2013-06-27 Cisco Technology, Inc. Overlay-Based Packet Steering
US20130163427A1 (en) 2011-12-22 2013-06-27 Ludovic Beliveau System for flexible and extensible flow processing in software-defined networks
US20130227097A1 (en) 2010-09-14 2013-08-29 Hitachi, Ltd. Multi-tenancy information processing system, management server, and configuration management method
US8571031B2 (en) 2009-10-07 2013-10-29 Intel Corporation Configurable frame processing pipeline in a packet switch
US8611351B2 (en) 2007-04-19 2013-12-17 Hewlett-Packard Development Company, L.P. Marked packet forwarding
US8612627B1 (en) 2010-03-03 2013-12-17 Amazon Technologies, Inc. Managing encoded multi-part communications for provided computer networks
US8621058B2 (en) 2010-10-28 2013-12-31 Hewlett-Packard Development Company, L.P. Providing cloud-based computing services
US8625594B2 (en) 2009-11-02 2014-01-07 Marvell World Trade Ltd. Switching apparatus and method based on virtual interfaces
US20140016501A1 (en) 2012-07-16 2014-01-16 International Business Machines Corporation Flow based overlay network
US8644188B1 (en) 2009-06-25 2014-02-04 Amazon Technologies, Inc. Providing virtual networking functionality for managed computer networks
US8650618B2 (en) 2009-07-22 2014-02-11 Cisco Technology, Inc. Integrating service insertion architecture and virtual private network
US8762501B2 (en) 2011-08-29 2014-06-24 Telefonaktiebolaget L M Ericsson (Publ) Implementing a 3G packet core in a cloud computer with openflow data and control planes
US20140195666A1 (en) 2011-08-04 2014-07-10 Midokura Sarl System and method for implementing and managing virtual networks
US8819678B2 (en) 2010-12-15 2014-08-26 Red Hat Israel, Ltd. Live migration of a guest from a source hypervisor to a target hypervisor

Family Cites Families (157)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06250869A (en) 1993-03-01 1994-09-09 Hitachi Ltd Distributed control system
JPH0779233A (en) 1993-06-29 1995-03-20 Synoptics Commun Inc Apparatus for establishing topology, method and apparatus for communicating topology information
US5473771A (en) 1993-09-01 1995-12-05 At&T Corp. Fault-tolerant processing system architecture
US5586121A (en) 1995-04-21 1996-12-17 Hybrid Networks, Inc. Asymmetric hybrid access system and method
US6035105A (en) 1996-01-02 2000-03-07 Cisco Technology, Inc. Multiple VLAN architecture system
US5898830A (en) 1996-10-17 1999-04-27 Network Engineering Software Firewall providing enhanced network security and user transparency
AU740012B2 (en) 1997-03-12 2001-10-25 Nomadix, Inc. Nomadic translator or router
US6295299B1 (en) 1997-08-29 2001-09-25 Extreme Networks, Inc. Data path architecture for a LAN switch
US6092121A (en) 1997-12-18 2000-07-18 International Business Machines Corporation Method and apparatus for electronically integrating data captured in heterogeneous information systems
US6424659B2 (en) 1998-07-17 2002-07-23 Network Equipment Technologies, Inc. Multi-layer switching apparatus and method
US7055027B1 (en) 1999-03-22 2006-05-30 Microsoft Corporation System and method for trusted inspection of a data stream
JP2000332817A (en) 1999-05-18 2000-11-30 Fujitsu Ltd Packet processing unit
US6573369B2 (en) * 1999-05-21 2003-06-03 Bioforce Nanosciences, Inc. Method and apparatus for solid state molecular analysis
US6678274B1 (en) 1999-07-30 2004-01-13 Riverstone Networks, Inc. Method and system for managing forwarding tables
US6505192B1 (en) 1999-08-12 2003-01-07 International Business Machines Corporation Security rule processing for connectionless protocols
US7020697B1 (en) 1999-10-01 2006-03-28 Accenture Llp Architectures for netcentric computing systems
US6963585B1 (en) 1999-10-21 2005-11-08 International Business Machines Corporation Method and system for establishing a virtual path capability in a frame relay network
US9444785B2 (en) * 2000-06-23 2016-09-13 Cloudshield Technologies, Inc. Transparent provisioning of network access to an application
US7725602B2 (en) 2000-07-19 2010-05-25 Akamai Technologies, Inc. Domain name resolution using a distributed DNS network
US6973023B1 (en) 2000-12-30 2005-12-06 Cisco Technology, Inc. Method for routing information over a network employing centralized control
US7343410B2 (en) 2001-06-28 2008-03-11 Finisar Corporation Automated creation of application data paths in storage area networks
US7126944B2 (en) 2001-07-05 2006-10-24 Intel Corporation Routing packets across multiple forwarding elements
US20030009559A1 (en) * 2001-07-09 2003-01-09 Naoya Ikeda Network system and method of distributing accesses to a plurality of server apparatus in the network system
US7765313B2 (en) 2001-10-09 2010-07-27 Alcatel Lucent Hierarchical protocol classification engine
US20030079000A1 (en) 2001-10-19 2003-04-24 Chamberlain Robert L. Methods and apparatus for configuring multiple logical networks of devices on a single physical network
JP3879594B2 (en) 2001-11-02 2007-02-14 日本電気株式会社 Switch method, apparatus and program
US7042912B2 (en) 2001-12-18 2006-05-09 Nortel Networks Limited Resynchronization of control and data path state for networks
US20050060365A1 (en) * 2002-01-24 2005-03-17 Robinson Scott L. Context-based information processing
US6781990B1 (en) 2002-02-11 2004-08-24 Extreme Networks Method and system for managing traffic in a packet network environment
US20030223379A1 (en) 2002-05-28 2003-12-04 Xuguang Yang Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols
US7340535B1 (en) 2002-06-04 2008-03-04 Fortinet, Inc. System and method for controlling routing in a virtual router system
US7925661B2 (en) 2002-06-27 2011-04-12 International Business Machines Corporation Method and system for information processing using meta-archives
US7206861B1 (en) 2002-07-29 2007-04-17 Juniper Networks, Inc. Network traffic distribution across parallel paths
US20040131059A1 (en) 2002-09-19 2004-07-08 Ram Ayyakad Single-pass packet scan
US20040073659A1 (en) 2002-10-15 2004-04-15 Carl Rajsic Method and apparatus for managing nodes in a network
US7606229B1 (en) 2002-11-08 2009-10-20 Cisco Technology, Inc. Generic bridge packet tunneling
US7283465B2 (en) 2003-01-07 2007-10-16 Corrigent Systems Ltd. Hierarchical virtual private LAN service protection scheme
US20040199587A1 (en) * 2003-04-01 2004-10-07 Mcknight Russell F. Company-only electronic mail
US8473620B2 (en) 2003-04-14 2013-06-25 Riverbed Technology, Inc. Interception of a cloud-based communication connection
US20050022017A1 (en) 2003-06-24 2005-01-27 Maufer Thomas A. Data structures and state tracking for network protocol processing
US7774597B2 (en) 2003-06-27 2010-08-10 Ram Gopal Lakshmi Narayanan System and method for nodes communicating in a shared network segment
US7453852B2 (en) 2003-07-14 2008-11-18 Lucent Technologies Inc. Method and system for mobility across heterogeneous address spaces
US7697527B2 (en) 2003-07-30 2010-04-13 Nortel Networks Limited Method and apparatus for direct frame switching using frame contained destination information
US7246174B2 (en) * 2003-10-28 2007-07-17 Nacon Consulting, Llc Method and system for accessing and managing virtual machines
US7447775B1 (en) 2003-11-07 2008-11-04 Cisco Technology, Inc. Methods and apparatus for supporting transmission of streaming data
US7706325B2 (en) 2003-12-30 2010-04-27 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for handling context of data packet flows
JP3972338B2 (en) 2004-03-09 2007-09-05 株式会社シンクチューブ Mobile communication device and mobile communication program
US7742398B1 (en) 2004-04-12 2010-06-22 Azul Systems, Inc. Information redirection
US7664818B2 (en) * 2004-04-21 2010-02-16 Sap (Ag) Message-oriented middleware provider having multiple server instances integrated into a clustered application server infrastructure
US7761259B1 (en) 2004-05-26 2010-07-20 William Brian Seymour Methods and systems for testing evaluation modules
JP4403396B2 (en) * 2004-07-13 2010-01-27 ソニー株式会社 IMAGING DEVICE AND IMAGING ELEMENT INTEGRATED CIRCUIT
DE602004011928T2 (en) 2004-08-02 2009-02-12 Alcatel Lucent Method for controlling a shared resource by different managers
US20060059551A1 (en) * 2004-09-13 2006-03-16 Utstarcom Inc. Dynamic firewall capabilities for wireless access gateways
GB2419703A (en) 2004-10-29 2006-05-03 Hewlett Packard Development Co Isolated virtual overlay infrastructures each having an interface to control interaction with others
US7646775B2 (en) 2005-03-08 2010-01-12 Leaf Networks, Llc Protocol and system for firewall and NAT traversal for TCP connections
US7192306B2 (en) * 2005-07-06 2007-03-20 Ultra Volt, Inc. High voltage connector
US7855950B2 (en) 2005-08-01 2010-12-21 Cisco Technology, Inc. Congruent forwarding paths for unicast and multicast traffic
US7802000B1 (en) 2005-08-01 2010-09-21 Vmware Virtual network in server farm
US8645964B2 (en) 2005-08-23 2014-02-04 Mellanox Technologies Ltd. System and method for accelerating input/output access operation on a virtual machine
US20070101323A1 (en) 2005-10-28 2007-05-03 Microsoft Corporation Automatic virtual machine adjustments to network changes
US7945658B1 (en) 2005-12-05 2011-05-17 Narus, Inc. Method for real-time visualization of BGP analysis and trouble-shooting
US7710872B2 (en) 2005-12-14 2010-05-04 Cisco Technology, Inc. Technique for enabling traffic engineering on CE-CE paths across a provider network
US7647426B2 (en) 2006-01-12 2010-01-12 Cisco Technology, Inc. Method and apparatus for achieving Border Gateway Protocol convergence using alternate route information
US20070174429A1 (en) 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US8533808B2 (en) * 2006-02-02 2013-09-10 Check Point Software Technologies Ltd. Network security smart load balancing using a multiple processor device
US7840398B2 (en) * 2006-03-28 2010-11-23 Intel Corporation Techniques for unified management communication for virtualization systems
US7801128B2 (en) 2006-03-31 2010-09-21 Amazon Technologies, Inc. Managing communications between computing nodes
US8543808B2 (en) * 2006-08-24 2013-09-24 Microsoft Corporation Trusted intermediary for network data processing
JP2008107176A (en) * 2006-10-25 2008-05-08 Hitachi High-Technologies Corp Separation column and liquid chromatograph using it
US8185893B2 (en) * 2006-10-27 2012-05-22 Hewlett-Packard Development Company, L.P. Starting up at least one virtual machine in a physical machine by a load balancer
US20090070877A1 (en) * 2006-12-18 2009-03-12 Carol Davids Method for securing streaming multimedia network transmissions
US7738457B2 (en) 2006-12-20 2010-06-15 Oracle America, Inc. Method and system for virtual routing using containers
US7793148B2 (en) 2007-01-12 2010-09-07 International Business Machines Corporation Using virtual copies in a failover and failback environment
US7936677B2 (en) * 2007-03-22 2011-05-03 Sharp Laboratories Of America, Inc. Selection of an audio visual stream by sampling
US7941837B1 (en) * 2007-04-18 2011-05-10 Juniper Networks, Inc. Layer two firewall with active-active high availability support
WO2008138008A1 (en) 2007-05-08 2008-11-13 Riverbed Technology, Inc A hybrid segment-oriented file server and wan accelerator
US8321936B1 (en) 2007-05-30 2012-11-27 M86 Security, Inc. System and method for malicious software detection in multiple protocols
US8014409B1 (en) 2007-05-30 2011-09-06 Foundry Networks, Llc Virtual router identifier that spans multiple interfaces in a routing device
US8132248B2 (en) 2007-07-18 2012-03-06 Trend Micro Incorporated Managing configurations of a firewall
US8528070B2 (en) * 2007-09-05 2013-09-03 Hewlett-Packard Development Company, L.P. System and method for secure service delivery
CN101904155A (en) * 2007-12-19 2010-12-01 爱立信电话股份有限公司 Method of facilitating IP connections to hosts behind middleboxes
US8194674B1 (en) 2007-12-20 2012-06-05 Quest Software, Inc. System and method for aggregating communications and for translating between overlapping internal network addresses and unique external network addresses
US9432213B2 (en) 2007-12-31 2016-08-30 Rpx Clearinghouse Llc IP forwarding across a link state protocol controlled ethernet network
US7826390B2 (en) 2008-01-15 2010-11-02 At&T Intellectual Property I, L.P. Method and apparatus for providing a distributed subscriber load distribution
US8155028B2 (en) 2008-03-17 2012-04-10 Alcatel Lucent Method and apparatus for providing full logical connectivity in MPLS networks
US8996683B2 (en) 2008-06-09 2015-03-31 Microsoft Technology Licensing, Llc Data center without structural bottlenecks
US8031606B2 (en) 2008-06-24 2011-10-04 Intel Corporation Packet switching
US8108467B2 (en) 2008-06-26 2012-01-31 International Business Machines Corporation Load balanced data processing performed on an application message transmitted between compute nodes of a parallel computer
US8027260B2 (en) 2008-07-23 2011-09-27 Verizon Patent And Licensing Inc. Mixed integer programming model for minimizing leased access network costs
US8005015B2 (en) 2008-07-28 2011-08-23 Telefonaktiebolaget L M Ericsson (Publ) Signaling framework for negotiating and executing composition of registries
US20100036903A1 (en) * 2008-08-11 2010-02-11 Microsoft Corporation Distributed load balancer
US8064362B2 (en) * 2008-08-21 2011-11-22 Cisco Technology, Inc. Wide area network optimization proxy routing protocol
US8018866B1 (en) 2008-08-26 2011-09-13 Juniper Networks, Inc. Adaptively applying network acceleration services with an intermediate network device
US8265071B2 (en) 2008-09-11 2012-09-11 Juniper Networks, Inc. Methods and apparatus related to a flexible data center security architecture
US7873060B2 (en) 2008-10-18 2011-01-18 Fortinet, Inc. Accelerating data communication using tunnels
US8171124B2 (en) * 2008-11-25 2012-05-01 Citrix Systems, Inc. Systems and methods for GSLB remote service monitoring
US8493871B2 (en) * 2008-11-26 2013-07-23 Riverbed Technology, Inc. End-to end analysis of transactions in networks with traffic-altering devices
US8868675B2 (en) * 2008-12-04 2014-10-21 Cisco Technology, Inc. Network optimization using distributed virtual resources
US8316113B2 (en) 2008-12-19 2012-11-20 Watchguard Technologies, Inc. Cluster architecture and configuration for network security devices
US8255496B2 (en) 2008-12-30 2012-08-28 Juniper Networks, Inc. Method and apparatus for determining a network topology during network provisioning
EP2219045B1 (en) * 2009-01-28 2012-03-14 Siemens Aktiengesellschaft Radar high frequency module
CN102308534A (en) 2009-02-03 2012-01-04 日本电气株式会社 Application switch system and application switch method
JP5544097B2 (en) 2009-02-23 2014-07-09 株式会社日立国際電気 Network connection device
EP2416532B1 (en) 2009-03-30 2014-10-08 Nec Corporation Communication flow control system, communication flow control method, and communication flow processing program
US8589919B2 (en) 2009-04-28 2013-11-19 Cisco Technology, Inc. Traffic forwarding for virtual machines
US9497039B2 (en) 2009-05-28 2016-11-15 Microsoft Technology Licensing, Llc Agile data center network architecture
US9621516B2 (en) * 2009-06-24 2017-04-11 Vmware, Inc. Firewall configured with dynamic membership sets representing machine attributes
US8954957B2 (en) 2009-07-01 2015-02-10 Riverbed Technology, Inc. Network traffic processing according to network traffic rule criteria and transferring network traffic metadata in a network device that includes hosted virtual machines
US8990433B2 (en) 2009-07-01 2015-03-24 Riverbed Technology, Inc. Defining network traffic processing flows between virtual machines
US8634437B2 (en) 2009-07-01 2014-01-21 Riverbed Technology, Inc. Extended network protocols for communicating metadata with virtual machines
US8572609B2 (en) 2009-07-01 2013-10-29 Riverbed Technology, Inc. Configuring bypass functionality of a network device based on the state of one or more hosted virtual machines
US9270542B2 (en) 2009-07-31 2016-02-23 Ixia Apparatus and methods for forwarding data packets captured from a network
US20110085557A1 (en) 2009-10-08 2011-04-14 Brocade Communications Systems, Inc. Partitioning of Switches and Fabrics into Logical Switches and Fabrics
US8693485B2 (en) * 2009-10-14 2014-04-08 Dell Products, Lp Virtualization aware network switch
US9531674B2 (en) 2009-11-11 2016-12-27 Microsoft Technology Licensing, Llc Virtual host security profiles
US9203747B1 (en) * 2009-12-07 2015-12-01 Amazon Technologies, Inc. Providing virtual networking device functionality for managed computer networks
US8887266B2 (en) 2010-01-08 2014-11-11 Board Of Trustees Of Michigan State University Method for computing network reachability
US8856319B1 (en) 2010-02-03 2014-10-07 Citrix Systems, Inc. Event and state management in a scalable cloud computing environment
US8751738B2 (en) 2010-02-08 2014-06-10 Microsoft Corporation Background migration of virtual storage
US8913661B2 (en) 2010-02-19 2014-12-16 Skype Motion estimation using block matching indexing
JP5651970B2 (en) 2010-03-11 2015-01-14 日本電気株式会社 COMMUNICATION DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM
JP5505707B2 (en) 2010-03-30 2014-05-28 日本電気株式会社 Network system and operation method thereof
US8599854B2 (en) 2010-04-16 2013-12-03 Cisco Technology, Inc. Method of identifying destination in a virtual environment
US8811153B1 (en) 2010-05-03 2014-08-19 Pluribus Networks Inc. Switch fabric for network devices
US8813209B2 (en) 2010-06-03 2014-08-19 International Business Machines Corporation Automating network reconfiguration during migrations
US8966040B2 (en) * 2010-07-06 2015-02-24 Nicira, Inc. Use of network information base structure to establish communication between applications
US9104458B1 (en) 2010-09-30 2015-08-11 Amazon Technologies, Inc. Managing virtual computing nodes using isolation and migration techniques
US8699499B2 (en) * 2010-12-08 2014-04-15 At&T Intellectual Property I, L.P. Methods and apparatus to provision cloud computing network elements
US9329886B2 (en) 2010-12-10 2016-05-03 Amazon Technologies, Inc. Virtual machine morphing for heterogeneous migration environments
US8615579B1 (en) 2010-12-28 2013-12-24 Amazon Technologies, Inc. Managing virtual machine migration
US8863256B1 (en) 2011-01-14 2014-10-14 Cisco Technology, Inc. System and method for enabling secure transactions using flexible identity management in a vehicular environment
US9264868B2 (en) 2011-01-19 2016-02-16 Qualcomm Incorporated Management of network access requests
US8612744B2 (en) * 2011-02-10 2013-12-17 Varmour Networks, Inc. Distributed firewall architecture using virtual machines
US8776207B2 (en) * 2011-02-16 2014-07-08 Fortinet, Inc. Load balancing in a network with session information
US8959569B2 (en) 2011-03-18 2015-02-17 Juniper Networks, Inc. Security enforcement in virtualized systems
US20140019639A1 (en) 2011-03-31 2014-01-16 Hiroshi Ueno Computer system and communication method
US9043452B2 (en) * 2011-05-04 2015-05-26 Nicira, Inc. Network control apparatus and method for port isolation
US9100298B2 (en) 2011-05-23 2015-08-04 Cisco Technology, Inc. Host visibility as a network service
US8739244B1 (en) * 2011-06-07 2014-05-27 Riverbed Technology, Inc. Configuring and authenticating WAN optimization devices for accessing content delivery networks
US8923294B2 (en) 2011-06-28 2014-12-30 Polytechnic Institute Of New York University Dynamically provisioning middleboxes
US20130019015A1 (en) 2011-07-12 2013-01-17 International Business Machines Corporation Application Resource Manager over a Cloud
US9424144B2 (en) 2011-07-27 2016-08-23 Microsoft Technology Licensing, Llc Virtual machine migration to minimize packet loss in virtualized network
US8813074B2 (en) 2011-08-05 2014-08-19 Vmware, Inc. Detecting and correcting network interruptions using network address translation
US9384030B2 (en) 2011-08-11 2016-07-05 Ca, Inc. System and method for deploying a dynamic virtual network address translation appliance
JP5870192B2 (en) 2011-08-17 2016-02-24 ニシラ, インコーポレイテッド Logical L3 routing
US8856518B2 (en) 2011-09-07 2014-10-07 Microsoft Corporation Secure and efficient offloading of network policies to network interface cards
US20130074066A1 (en) 2011-09-21 2013-03-21 Cisco Technology, Inc. Portable Port Profiles for Virtual Machines in a Virtualized Data Center
US9069586B2 (en) * 2011-10-13 2015-06-30 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US20130103834A1 (en) 2011-10-21 2013-04-25 Blue Coat Systems, Inc. Multi-Tenant NATting for Segregating Traffic Through a Cloud Service
AU2015255293B2 (en) 2011-11-15 2018-03-15 Nicira, Inc. Architecture of networks with middleboxes
AU2015258160B2 (en) 2011-11-15 2017-04-20 Nicira, Inc. Network control system for configuring middleboxes
US9690605B2 (en) 2012-04-09 2017-06-27 Hewlett Packard Enterprise Development Lp Configuration of an edge switch downlink port with a network policy of a published network configuration service type
WO2013158917A2 (en) 2012-04-18 2013-10-24 Nicira, Inc. Using transactions to compute and propagate network forwarding state
EP2853077B1 (en) 2012-06-06 2020-03-25 Huawei Technologies Co., Ltd. Method of seamless integration and independent evolution of information-centric networking via software defined networking
US9304801B2 (en) 2012-06-12 2016-04-05 TELEFONAKTIEBOLAGET L M ERRICSSON (publ) Elastic enforcement layer for cloud security using SDN
US9104492B2 (en) 2012-09-04 2015-08-11 Wisconsin Alumni Research Foundation Cloud-based middlebox management system
US10263916B2 (en) 2012-12-03 2019-04-16 Hewlett Packard Enterprise Development Lp System and method for message handling in a network device

Patent Citations (184)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5504921A (en) 1990-09-17 1996-04-02 Cabletron Systems, Inc. Network management system using model-based intelligence
US6104699A (en) 1994-06-13 2000-08-15 Telefonaktiebolget Lm Ericsson Method and device for partitioning physical network resources
US5751967A (en) 1994-07-25 1998-05-12 Bay Networks Group, Inc. Method and apparatus for automatically configuring a network device to support a virtual network
US5550816A (en) 1994-12-29 1996-08-27 Storage Technology Corporation Method and apparatus for virtual switching
US6512745B1 (en) 1996-03-08 2003-01-28 Hitachi, Ltd. Packet switching network, packet switching equipment, and network management equipment
US7046630B2 (en) 1996-03-08 2006-05-16 Hitachi, Ltd. Packet switching network, packet switching equipment and network management equipment
WO1999018534A3 (en) 1997-10-06 1999-09-16 Web Balance Inc System for balancing loads among network servers
US7055173B1 (en) 1997-12-19 2006-05-30 Avaya Technology Corp. Firewall pooling in a network flowswitch
US6353614B1 (en) 1998-03-05 2002-03-05 3Com Corporation Method and protocol for distributed network address translation
US6539432B1 (en) 1998-05-19 2003-03-25 Hitachi, Ltd. Network manager, nodes and network management system
US20050249199A1 (en) 1999-07-02 2005-11-10 Cisco Technology, Inc., A California Corporation Load balancing using distributed forwarding agents with application based feedback for different virtual machines
US6680934B1 (en) 1999-12-02 2004-01-20 Nortel Networks Limited System, device and method for expediting control flow in a communication system
US6880089B1 (en) 2000-03-31 2005-04-12 Avaya Technology Corp. Firewall clustering for multiple network servers
US20020093952A1 (en) 2000-06-30 2002-07-18 Gonda Rumi Sheryar Method for managing circuits in a multistage cross connect
US7818452B2 (en) 2000-09-13 2010-10-19 Fortinet, Inc. Distributed virtual system to support managed, network-based services
US6785843B1 (en) 2001-02-23 2004-08-31 Mcrae Andrew Data plane restart without state change in a control plane of an intermediate network node
US7209439B2 (en) 2001-03-20 2007-04-24 Mci, Llc Pool-based resource management in a data network
US20020194369A1 (en) 2001-03-20 2002-12-19 Worldcom, Inc. Policy-based synchronization of per-class resources between routers in a data network
US20020161867A1 (en) 2001-04-25 2002-10-31 Cochran Charles W. System and method for remote discovery and configuration of a network device
JP2003124976A (en) 2001-10-10 2003-04-25 Hitachi Ltd Method of allotting computer resources
US20030069972A1 (en) 2001-10-10 2003-04-10 Yutaka Yoshimura Computer resource allocating method
US20070140128A1 (en) 2001-11-02 2007-06-21 Eric Klinker System and method to provide routing control of information over networks
US20030093481A1 (en) 2001-11-09 2003-05-15 Julian Mitchell Middlebox control
US7512744B2 (en) 2001-12-28 2009-03-31 Network Appliance, Inc. Technique for enabling multiple virtual filers on a single filer to participate in multiple address spaces with overlapping network addresses
JP2003318949A (en) 2002-04-19 2003-11-07 Nippon Telegr & Teleph Corp <Ntt> Vpn system and router
US7197572B2 (en) 2002-05-06 2007-03-27 Qlogic, Corporation System and method for implementing logical switches in a network system
US20040049701A1 (en) 2002-09-05 2004-03-11 Jean-Francois Le Pennec Firewall system for interconnecting two IP networks managed by two different administrative entities
US20040054793A1 (en) 2002-09-16 2004-03-18 Richard Coleman System and method for high performance shared web hosting
US20090031041A1 (en) 2002-11-20 2009-01-29 4198638 Canada Inc. Forwarding system with multiple logical sub-system functionality
US20040098505A1 (en) 2002-11-20 2004-05-20 Clemmensen Daniel G. Forwarding system with multiple logical sub-system functionality
US20050021683A1 (en) 2003-03-27 2005-01-27 Chris Newton Method and apparatus for correlating network activity through visualizing network data
US7606260B2 (en) 2003-03-31 2009-10-20 Fujitsu Limited Virtual path configuration apparatus, virtual path configuration method, and computer product
US7283473B2 (en) 2003-04-10 2007-10-16 International Business Machines Corporation Apparatus, system and method for providing multiple logical channel adapters within a single physical channel adapter in a system area network
US7792987B1 (en) 2003-04-21 2010-09-07 Juniper Networks, Inc. Supporting virtual private networks using a first network topology for forwarding and a subset of the first network topology or a smaller topology for signaling
US7710874B2 (en) 2003-06-04 2010-05-04 International Business Machines Corporation System and method for automatic management of many computer data processing system pipes
US20050018669A1 (en) 2003-07-25 2005-01-27 International Business Machines Corporation Infiniband subnet management queue pair emulation for multiple logical ports on a single physical port
US20050050377A1 (en) 2003-08-25 2005-03-03 Chan Chun Kin Brink of failure and breach of security detection and recovery system
US7342916B2 (en) 2003-09-10 2008-03-11 Intel Corporation Method, apparatus and system for optimizing routing of mobile IP packets
US20050083953A1 (en) 2003-10-17 2005-04-21 Ip Infusion Inc., A Delaware Corporation System and method for providing redundant routing capabilities for a network node
US7555002B2 (en) 2003-11-06 2009-06-30 International Business Machines Corporation Infiniband general services queue pair virtualization for multiple logical ports on a single physical port
US20050132030A1 (en) 2003-12-10 2005-06-16 Aventail Corporation Network appliance
US7450598B2 (en) 2003-12-15 2008-11-11 At&T Intellectual Property I, L.P. System and method to provision MPLS/VPN network
US7478173B1 (en) 2003-12-18 2009-01-13 Wmware, Inc. Method and system for sharing a network connection in a virtual computer system
US20070286185A1 (en) 2003-12-22 2007-12-13 Anders Eriksson Control of Mobile Packet Streams
US7627692B2 (en) 2004-01-30 2009-12-01 Nokia Corporation Multiplexing of compressed control and user-plane messages
WO2005112390A1 (en) 2004-05-12 2005-11-24 Alcatel Automated containment of network intruder
US20090199177A1 (en) 2004-10-29 2009-08-06 Hewlett-Packard Development Company, L.P. Virtual computing infrastructure
EP1653688B1 (en) 2004-11-01 2009-12-23 Lucent Technologies Inc. Softrouter protocol disaggregation
US20060092976A1 (en) 2004-11-01 2006-05-04 Lucent Technologies Inc. Softrouter separate control network
US20080002579A1 (en) 2004-12-21 2008-01-03 Fredrik Lindholm Arrangement and a Method Relating to Flow of Packets in Communication Systems
US20080049621A1 (en) 2004-12-31 2008-02-28 Mcguire Alan Connection-Oriented Communications Scheme For Connection-Less Communications Traffic
US7730486B2 (en) 2005-02-28 2010-06-01 Hewlett-Packard Development Company, L.P. System and method for migrating virtual machines on cluster systems
US7936770B1 (en) 2005-03-08 2011-05-03 Enterasys Networks, Inc. Method and apparatus of virtual class of service and logical queue representation through network traffic distribution over multiple port interfaces
US20080071900A1 (en) 2005-03-16 2008-03-20 Wavestorm Device and a method for communicating in a network
US20060221961A1 (en) 2005-04-01 2006-10-05 International Business Machines Corporation Network communications for operating system partitions
US8149737B2 (en) 2005-08-09 2012-04-03 Motorola Solutions, Inc. Method and system for data transmission in a wireless network
US7649851B2 (en) 2005-11-11 2010-01-19 Hitachi, Ltd. Virtual network management method, virtual network management program, virtual network management system, and virtual network means
US20070266433A1 (en) 2006-03-03 2007-11-15 Hezi Moore System and Method for Securing Information in a Virtual Computing Environment
US20070233838A1 (en) 2006-03-30 2007-10-04 Hitachi, Ltd. Method for workload management of plural servers
US7839847B2 (en) 2006-05-08 2010-11-23 Cisco Technology, Inc. Methods and apparatus providing VPN traffic matrix construction
US20070283348A1 (en) 2006-05-15 2007-12-06 White Anthony R P Method and system for virtual machine migration
US8060875B1 (en) 2006-05-26 2011-11-15 Vmware, Inc. System and method for multiple virtual teams
US7764599B2 (en) 2006-06-01 2010-07-27 Alaxala Networks Corporation Network routing device and network routing method
US20080005293A1 (en) 2006-06-30 2008-01-03 Telefonaktiebolaget Lm Ericsson (Publ) Router and method for server load balancing
US8204982B2 (en) 2006-09-14 2012-06-19 Quova, Inc. System and method of middlebox detection and characterization
US8463904B2 (en) 2006-09-14 2013-06-11 Quova, Inc. System and method of middlebox detection and characterization
US20080072305A1 (en) 2006-09-14 2008-03-20 Ouova, Inc. System and method of middlebox detection and characterization
US7826482B1 (en) 2006-11-17 2010-11-02 Juniper Networks, Inc. Service-specific forwarding in an LDP-RSVP hybrid network
US20100046530A1 (en) 2006-12-12 2010-02-25 Jani Hautakorpi IP Address Distribution in Middleboxes
US20080163207A1 (en) 2007-01-03 2008-07-03 International Business Machines Corporation Moveable access control list (acl) mechanisms for hypervisors and virtual machines and virtual port firewalls
US7856549B2 (en) 2007-01-24 2010-12-21 Hewlett-Packard Development Company, L.P. Regulating power consumption
US20080189769A1 (en) 2007-02-01 2008-08-07 Martin Casado Secure network switching infrastructure
WO2008095010A1 (en) 2007-02-01 2008-08-07 The Board Of Trustees Of The Leland Stanford Jr. University Secure network switching infrastructure
US20080186990A1 (en) 2007-02-02 2008-08-07 International Business Machines Corporation Translation module, method and computer program product for providing multiple infiniband address support for vm migration using infiniband address translation
US20100046531A1 (en) 2007-02-02 2010-02-25 Groupe Des Ecoles Des Telecommunications (Get) Institut National Des Telecommunications (Int) Autonomic network node system
US20080196100A1 (en) 2007-02-14 2008-08-14 Sajeev Madhavan Network monitoring
US20080225853A1 (en) 2007-02-14 2008-09-18 Melman David Logical bridging system and method
US7925850B1 (en) 2007-02-16 2011-04-12 Vmware, Inc. Page signature disambiguation for increasing the efficiency of virtual machine migration in shared-page virtualized computer systems
US20080205377A1 (en) 2007-02-22 2008-08-28 Blade Network Technologies, Inc. System and methods for providing server virtualization assistance
US7706266B2 (en) 2007-03-12 2010-04-27 Citrix Systems, Inc. Systems and methods of providing proxy-based quality of service
US20080240122A1 (en) 2007-03-27 2008-10-02 Richardson David R Configuring intercommunications between computing nodes
US8055789B2 (en) 2007-03-27 2011-11-08 Amazon Technologies, Inc. Configuring intercommunications between computing nodes
US8166201B2 (en) 2007-03-27 2012-04-24 Amazon Technologies, Inc. Configuring intercommunications between computing nodes
US8611351B2 (en) 2007-04-19 2013-12-17 Hewlett-Packard Development Company, L.P. Marked packet forwarding
US8031633B2 (en) 2007-08-13 2011-10-04 Honeywell International Inc. Virtual network architecture for space data processing
US20090063750A1 (en) 2007-08-27 2009-03-05 International Business Machines Corporation Migrating contents of a memory on a virtual machine
US20090083445A1 (en) 2007-09-24 2009-03-26 Ganga Ilango S Method and system for virtual port communications
US20090092137A1 (en) 2007-10-03 2009-04-09 Virtela Communications, Inc. Virtualized application acceleration infrastructure
US20090122710A1 (en) 2007-11-08 2009-05-14 Chen Bar-Tor Event correlation using network data flow simulation over unmanaged network segments
US20090129271A1 (en) 2007-11-19 2009-05-21 Rajesh Ramankutty Providing services to packet flows in a network
US20090150527A1 (en) 2007-12-10 2009-06-11 Sun Microsystems, Inc. Method and system for reconfiguring a virtual network path
US8199750B1 (en) 2007-12-18 2012-06-12 World Wide Packets, Inc. Communicating with a control plane using a forwarding information format and control plane processing of packets devoid of a virtual switch identifier
US20090161547A1 (en) 2007-12-20 2009-06-25 Packeteer, Inc. Compression Mechanisms for Control Plane-Data Plane Processing Architectures
US20100115101A1 (en) 2008-03-07 2010-05-06 Antonio Lain Distributed network connection policy management
US20090240924A1 (en) 2008-03-24 2009-09-24 Fujitsu Limited Information processing device, information processing method, and computer product
US20090249470A1 (en) 2008-03-27 2009-10-01 Moshe Litvin Combined firewalls
US20090249473A1 (en) 2008-03-31 2009-10-01 Cohn Daniel T Authorizing communications between computing nodes
US20100138830A1 (en) 2008-05-02 2010-06-03 Skytap Multitenant hosted virtual machine infrastructure
US8339959B1 (en) 2008-05-20 2012-12-25 Juniper Networks, Inc. Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US20090292858A1 (en) 2008-05-23 2009-11-26 Vmware, Inc. Distributed Virtual Switch for Virtualized Computer Systems
US20090300210A1 (en) 2008-05-28 2009-12-03 James Michael Ferris Methods and systems for load balancing in cloud-based networks
US20090303880A1 (en) 2008-06-09 2009-12-10 Microsoft Corporation Data center interconnect and traffic engineering
US20090327781A1 (en) 2008-06-30 2009-12-31 Sun Microsystems, Inc. Method and system for power management in a virtual machine environment without disrupting network connectivity
US7808929B2 (en) 2008-09-30 2010-10-05 Oracle America, Inc. Efficient ACL lookup algorithms
US7885276B1 (en) 2008-09-30 2011-02-08 Emc Corporation Isolating network traffic in multi-tenant virtualization environments
US20100115080A1 (en) * 2008-11-06 2010-05-06 Kageyama Soshi Method of controlling the communication between a machine using private addresses and a communication device connected to a global network
US20100125667A1 (en) 2008-11-19 2010-05-20 Vmware, Inc. Dynamic configuration of virtual machines
US20100131636A1 (en) 2008-11-24 2010-05-27 Vmware, Inc. Application delivery control module for virtual network switch
US20100153554A1 (en) 2008-12-15 2010-06-17 Thomas Anschutz Method and apparatus for providing network virtualization
US20100165876A1 (en) * 2008-12-30 2010-07-01 Amit Shukla Methods and apparatus for distributed dynamic network provisioning
US8054832B1 (en) 2008-12-30 2011-11-08 Juniper Networks, Inc. Methods and apparatus for routing between virtual resources based on a routing location policy
US20100165877A1 (en) 2008-12-30 2010-07-01 Amit Shukla Methods and apparatus for distributed dynamic network provisioning
US7995483B1 (en) 2009-01-20 2011-08-09 Juniper Networks, Inc. Simultaneously testing connectivity to multiple remote maintenance endpoints of the same maintenance association
US7948986B1 (en) 2009-02-02 2011-05-24 Juniper Networks, Inc. Applying services within MPLS networks
US20100214949A1 (en) 2009-02-23 2010-08-26 Cisco Technology, Inc. Distributed data center access switch
US20110261825A1 (en) 2009-03-09 2011-10-27 Nec Corporation OpenFlow COMMUNICATION SYSTEM AND OpenFlow COMMUNICATION METHOD
US8265075B2 (en) 2009-03-16 2012-09-11 International Business Machines Corporation Method and apparatus for managing, configuring, and controlling an I/O virtualization device through a network switch
US20100257263A1 (en) 2009-04-01 2010-10-07 Nicira Networks, Inc. Method and apparatus for implementing and managing virtual switches
US20100254385A1 (en) 2009-04-07 2010-10-07 Cisco Technology, Inc. Service Insertion Architecture (SIA) in a Virtual Private Network (VPN) Aware Network
US8027354B1 (en) 2009-04-29 2011-09-27 Cisco Technology, Inc. Network consolidation for virtualized servers
US20100287548A1 (en) 2009-05-06 2010-11-11 Vmware, Inc. Long Distance Virtual Machine Migration
US20100322255A1 (en) 2009-06-22 2010-12-23 Alcatel-Lucent Usa Inc. Providing cloud-based services using dynamic network virtualization
US8644188B1 (en) 2009-06-25 2014-02-04 Amazon Technologies, Inc. Providing virtual networking functionality for managed computer networks
US8650618B2 (en) 2009-07-22 2014-02-11 Cisco Technology, Inc. Integrating service insertion architecture and virtual private network
US20110022695A1 (en) 2009-07-27 2011-01-27 Vmware, Inc. Management and Implementation of Enclosed Local Networks in a Virtual Lab
US8339994B2 (en) 2009-08-27 2012-12-25 Brocade Communications Systems, Inc. Defining an optimal topology for a group of logical switches
US20110075674A1 (en) 2009-09-30 2011-03-31 Alcatel-Lucent Usa Inc. Scalable architecture for enterprise extension in a cloud topology
US8571031B2 (en) 2009-10-07 2013-10-29 Intel Corporation Configurable frame processing pipeline in a packet switch
US20110085559A1 (en) 2009-10-08 2011-04-14 Brocade Communications Systems, Inc. Transit Switches in a Network of Logical Switches
US8625594B2 (en) 2009-11-02 2014-01-07 Marvell World Trade Ltd. Switching apparatus and method based on virtual interfaces
US8046456B1 (en) 2009-12-07 2011-10-25 Amazon Technologies, Inc. Using virtual networking devices to manage external connections
US7937438B1 (en) 2009-12-07 2011-05-03 Amazon Technologies, Inc. Using virtual networking devices to manage external connections
US8224971B1 (en) 2009-12-28 2012-07-17 Amazon Technologies, Inc. Using virtual networking devices and routing information to initiate external actions
US7991859B1 (en) 2009-12-28 2011-08-02 Amazon Technologies, Inc. Using virtual networking devices to connect managed computer networks
US7953865B1 (en) 2009-12-28 2011-05-31 Amazon Technologies, Inc. Using virtual networking devices to manage routing communications between connected computer networks
US8131852B1 (en) 2009-12-28 2012-03-06 Amazon Technologies, Inc. Using virtual networking devices to manage routing communications between connected computer networks
US8312129B1 (en) 2009-12-28 2012-11-13 Amazon Technologies, Inc. Using virtual networking devices to connect managed computer networks
US8612627B1 (en) 2010-03-03 2013-12-17 Amazon Technologies, Inc. Managing encoded multi-part communications for provided computer networks
US20110225594A1 (en) 2010-03-15 2011-09-15 International Business Machines Corporation Method and Apparatus for Determining Resources Consumed by Tasks
US8224931B1 (en) 2010-03-31 2012-07-17 Amazon Technologies, Inc. Managing use of intermediate destination computing nodes for provided computer networks
US20110299534A1 (en) 2010-06-08 2011-12-08 Brocade Communications Systems, Inc. Virtual port grouping for virtual cluster switching
US20110310899A1 (en) 2010-06-22 2011-12-22 Microsoft Corporation Distributed Virtual Network Gateways
US20120014386A1 (en) 2010-06-29 2012-01-19 Futurewei Technologies, Inc. Delegate Gateways and Proxy for Target Hosts in Large Layer 2 and Address Resolution with Duplicated Internet Protocol Addresses
US8456984B2 (en) 2010-07-19 2013-06-04 Ciena Corporation Virtualized shared protection capacity
US8473557B2 (en) 2010-08-24 2013-06-25 At&T Intellectual Property I, L.P. Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US20130227097A1 (en) 2010-09-14 2013-08-29 Hitachi, Ltd. Multi-tenancy information processing system, management server, and configuration management method
WO2012051884A1 (en) 2010-10-19 2012-04-26 中兴通讯股份有限公司 Method and system for realizing virtual machine mobility
US8621058B2 (en) 2010-10-28 2013-12-31 Hewlett-Packard Development Company, L.P. Providing cloud-based computing services
US20120144014A1 (en) 2010-12-01 2012-06-07 Cisco Technology, Inc. Directing data flows in data centers with clustering services
US8819678B2 (en) 2010-12-15 2014-08-26 Red Hat Israel, Ltd. Live migration of a guest from a source hypervisor to a target hypervisor
US20120155266A1 (en) 2010-12-17 2012-06-21 Microsoft Corporation Synchronizing state among load balancer components
US8468548B2 (en) 2010-12-17 2013-06-18 Microsoft Corporation Multi-tenant, high-density container service for hosting stateful and stateless middleware components
US20120236734A1 (en) 2011-03-16 2012-09-20 Juniper Networks, Inc. Packet loss measurement at service endpoints of a virtual private lan service
US20120246637A1 (en) 2011-03-22 2012-09-27 Cisco Technology, Inc. Distributed load balancer in a virtual machine environment
US20120281540A1 (en) 2011-05-03 2012-11-08 Cisco Technology, Inc. Mobile service routing in a network environment
US8743885B2 (en) 2011-05-03 2014-06-03 Cisco Technology, Inc. Mobile service routing in a network environment
US20140169375A1 (en) 2011-05-03 2014-06-19 Cisco Technology, Inc. Mobile service routing in a network environment
US20140195666A1 (en) 2011-08-04 2014-07-10 Midokura Sarl System and method for implementing and managing virtual networks
US8762501B2 (en) 2011-08-29 2014-06-24 Telefonaktiebolaget L M Ericsson (Publ) Implementing a 3G packet core in a cloud computer with openflow data and control planes
US20130073743A1 (en) 2011-09-19 2013-03-21 Cisco Technology, Inc. Services controlled session based flow interceptor
US20130074181A1 (en) 2011-09-19 2013-03-21 Cisco Technology, Inc. Auto Migration of Services Within a Virtual Data Center
US20130125230A1 (en) 2011-11-15 2013-05-16 Nicira, Inc. Firewalls in logical networks
EP2748717A1 (en) 2011-11-15 2014-07-02 Nicira Inc. Architecture of networks with middleboxes
AU2012340383B2 (en) 2011-11-15 2015-08-20 Nicira, Inc. Architecture of networks with middleboxes
AU2012340387B2 (en) 2011-11-15 2015-08-20 Nicira, Inc. Network control system for configuring middleboxes
EP2748750A4 (en) 2011-11-15 2015-04-08 Nicira Inc Firewalls in logical networks
US20130128891A1 (en) 2011-11-15 2013-05-23 Nicira, Inc. Connection identifier assignment and source network address translation
US20130132536A1 (en) 2011-11-15 2013-05-23 Nicira, Inc. Network control system for configuring middleboxes
US20130132531A1 (en) 2011-11-15 2013-05-23 Nicira, Inc. Architecture of networks with middleboxes
US20130132532A1 (en) 2011-11-15 2013-05-23 Nicira, Inc. Load balancing and destination network address translation middleboxes
EP2748714A1 (en) 2011-11-15 2014-07-02 Nicira Inc. Connection identifier assignment and source network address translation
EP2748978A1 (en) 2011-11-15 2014-07-02 Nicira Inc. Migrating middlebox state for distributed middleboxes
US20150081861A1 (en) 2011-11-15 2015-03-19 Nicira, Inc. Connection identifier assignment and source network address translation
EP2748713A1 (en) 2011-11-15 2014-07-02 Nicira Inc. Load balancing and destination network address translation middleboxes
US20130132533A1 (en) 2011-11-15 2013-05-23 Nicira, Inc. Control plane interface for logical middlebox services
US20130121209A1 (en) 2011-11-15 2013-05-16 Nicira, Inc. Wan optimizer for logical networks
US8913611B2 (en) 2011-11-15 2014-12-16 Nicira, Inc. Connection identifier assignment and source network address translation
EP2748716A4 (en) 2011-11-15 2015-02-11 Nicira Inc Network control system for configuring middleboxes
US8966029B2 (en) 2011-11-15 2015-02-24 Nicira, Inc. Network control system for configuring middleboxes
US8966024B2 (en) 2011-11-15 2015-02-24 Nicira, Inc. Architecture of networks with middleboxes
US20130163594A1 (en) 2011-12-21 2013-06-27 Cisco Technology, Inc. Overlay-Based Packet Steering
US20130163427A1 (en) 2011-12-22 2013-06-27 Ludovic Beliveau System for flexible and extensible flow processing in software-defined networks
US20130163475A1 (en) 2011-12-22 2013-06-27 Ludovic Beliveau Controller for flexible and extensible flow processing in software-defined networks
US20140016501A1 (en) 2012-07-16 2014-01-16 International Business Machines Corporation Flow based overlay network

Non-Patent Citations (87)

* Cited by examiner, † Cited by third party
Title
Andersen, David, et al., "Resilient Overlay Networks," Oct. 2001, 15 pages, 18th ACM Symp. on Operating Systems Principles (SOSP), Banff, Canada, ACM.
Anderson, Thomas, et al., "Overcoming the Internet Impasse through Virtualization," Apr. 2005, pp. 34-41, IEEE Computer Society.
Anhalt, Fabienne, et al., "Analysis and evaluation of a XEN based virtual router," Sep. 2008, pp. 1-60, Unite de recherché INRA Phone-Alpes, Montbonnot Saint-Ismier, France.
Author Unknown , "Cisco Nexis 1000V Series Switches," Date Unknown but prior to Jul. 29, 2010, 2 pages, Cisco Systems, Inc., http://web.archive.org/web/20100729045626/http://www.cisco.com/en/US/Products/ps9902/index.html.
Author Unknown , "Cisco VN-Link: Virtualization-Aware Networking," Month Unknown, 2009, 10 pages, Cisco Systems, Inc.
Author Unknown , "VMare for Linux Networking Support," Date Unknown but prior to Nov. 17, 1999, pp. 1-5, VMWare, Inc.
Author Unknown, "Cisco VN-Link: Virtual Machine-Aware Networking," Apr. 2009, 2 pages, Cisco Systems, Inc.
Author Unknown, "Enabling Service Chaining on Cisco Nexus 1000V Series," Month Unknown, 2012, 25 pages, CISCO.
Author Unknown, "Intel 82599 10 Gigabit Ethernet Controller: Datasheet, Revision: 2.73," Dec. 2011, 930 pages, Intel Corporation.
Author Unknown, "Virtual Machine Device Queues," White Paper, Month Unknown, 2007, pp. 1-4, Intel Corporation.
Barham, Paul, et al., "Xen and the Art of Virtualization," Oct. 19-22, 2003, pp. 1-14, SOSP'03, Bolton Landing New York, USA.
Cai, Zheng, et al., "The Preliminary Design and Implementation of the Maestro Network Control Platform," Oct. 1, 2008, pp. 1-17, NSF.
Casado, Martin, et al. "Ethane: Taking Control of the Enterprise," SIGCOMM'07, Aug. 27-31, 2007, pp. 1-12, ACM, Kyoto, Japan.
Casado, Martin, et al., "Rethinking Packet Forwarding Hardware," Seventh ACM SIGCOMM' HotNets Workshop, Nov. 2008, pp. 1-6, ACM.
Casado, Martin, et al., "SANE: A Protection Architecture for Enterprise Networks," In proceedings of Usenix Security, Aug. 2006, pp. 1-15.
Casado, Martin, et al., "Scaling Out: Network Virtualization Revisited," Month Unknown, 2010, pp. 1-8.
Casado, Martin, et al., "Virtualizing the Network Forwarding Plane," Dec. 2010, pp. 1-6.
Congdon, Paul, "Virtual Ethernet Port Aggregator Standards body Discussion," Nov. 10, 2008, pp. 1-26, HP.
Das, Suarav, et al. "Simple Unified Control for Packet and Circuit Networks," Month Unknown, 2009, pp. 147-148, IEEE.
Das, Suarav, et al., "Unifying Packet and Circuit Switched Networks with OpenFlow," Dec. 7, 2009, 10 pages.
Davie, B., et al., "A Stateless Transport Tunneling Protocol for Network Virtualization (STT)," Mar. 5, 2012, pp. 1-19, Nicira Networks, Inc., available at http://tools.ietf.org/html/draft-davie-stt-01.
Davoli, Renzo, "VDE: Virtual Distributed Ethernet," TRIDENTCOM'05, Feb. 23-25, 2005, pp. 1-8, IEEE Computer Society.
Dixon, Colin, et al., "An End to the Middle," Proceedings of the 12th conference on Hot topics in operating systems USENIX Association, May, 2009, pp. 1-5, Berkeley, CA, USA.
Dobrescu, Mihai, et al., "RouteBricks: Exploiting Parallelism to Scale Software Routers," SOSP'09, Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, Oct. 2009, pp. 1-17, ACM New York, NY.
Dumitriu, Dan Mihai, et al. U.S. Appl. No. 61/514,990, filed Aug. 4, 2011.
Farrel, A., "A Path Computation Element (PCS)-Based Architecture," Aug. 2006, pp. 1-41, RFC 4655.
Fischer, Anna, "[PATCH][RFC] net/bridge: add basic VEPA support," Jun. 2009, pp. 1- 5, GMANE Org.
Foster, Nate, et al., "Frenetic: A Network Programming Language," ICFP '11, Sep. 19-21, 2011, 13 pages, Tokyo, Japan.
Garfinkel, Tal, et al., "A Virtual Machine Introspection Based Architecture for Intrusion Detection," In Proc. Network and Distributed Systems Security Symposium, Feb. 2003, pp. 1-16.
Greenberg, Albert, et al., "A Clean Slate 4D Approach to Network Control and Management," ACM SIGCOMM Computer Communication Review, Oct. 2005, 12 pages, vol. 35, No. 5.
Greenberg, Albert, et al., "VL2: A Scalable and Flexible Data Center Network," SIGCOMM'09, Aug. 17-21, 2009, pp. 51-62, ACM, Barcelona, Spain.
Greenhalgh, Adam, et al., "Flow Processing and the Rise of Commodity Network Hardware," ACM SIGCOMM Computer Communication Review, Apr. 2009, pp. 21-26, vol. 39, No. 2.
Gude, Natasha, et al., "NOX: Towards an Operating System for Networks," ACM SIGCOMM Computer communication Review, Jul. 2008, pp. 105-110, vol. 38, No. 3.
Guo, Chanxiong, et al., "BCube: A High Performance, Server-centric Network Architecture for Modular Data Centers," SIGCOMM'09, Aug. 17-21, 2009, pp. 1-12, ACM, Barcelona, Spain.
Hinrichs, Timothy L., et al., "Practical Declarative Network Management," WREN'09, Aug. 21, 2009, pp. 1-10, Barcelona, Spain.
International Preliminary Report on Patentability for PCT/US2012/065359, May 30, 2014, Nicira, Inc.
Ioannidis, Sotiris, et al., "Implementing a Distributed Firewall," CCS'00, Month Unknown, 2000, pp. 1-10, ACM, Athens, Greece.
Joseph, Dilip, et al., "A Policy-aware Switching Layer for Date Centers," Jun. 24, 2008, 26 pages, Electrical Engineering and Computer Sciences, University of California, Berkeley, CA, USA.
Kamath, Daya, et. al., "Edge virtual Bridge Proposal, Version 0. Rev. 0.1," Apr. 23, 2010, pp. 1-72, IEEE.
Keller, Eric, et al., "The 'Platform as a Service' Model for Networking," Month Unknown, 2010, pp. 1-6.
Kent, S., "IP Encapsulating Security Payload (ESP)," Dec. 2005, pp. 1-44, The Internet Society.
Koponen, Teemu, et al., "Onix: A Distributed Control Platform for Large-scale Production Networks," In Proc. OSDI, Oct. 2010, pp. 1-14.
Lakshminarayanan, Karthik, et al., "Routing as a Service," Month Unknown, 2004, pp. 1-15, Berkeley, California.
Laurent, Ciavaglia, et al., "Autonomic network engineering for the self-managing Future Internet (AFI); Generic Autonomic Network Architecture (An Architectural Reference Model for Autonomic Networking, Cognitive Networking and Self-Management)," Apr. 2013, ETSI, France, Part 2 of 2, pp. 80-167.
Laurent, Ciavaglia, et al., "Autonomic network engineering for the self-managing Future Internet (AFI); Generic Autonomic Network Architecture (An Architectural Reference Model for Autonomic Networking, Cognitive Networking and Self-Management)," Apr., 2013, ETSI, France, Part 1 of 2, pp. 1-79.
Loo, Boon Thau, et al., "Declarative Routing: Extensible Routing with Declarative Queries," In Proc. of SIGCOMM, Aug. 21-26, 2005, 14 pages, Philadelphia, PA, USA.
Loo, Boon Thau, et al., "Implementing Declarative Overlays," In Proc. of SOSP, Oct. 2005, 16 pages, Brighton, UK.
Luo, Jianying, et al., "Prototyping Fast, Simple, Secure Switches for Ethane," Month Unknown, 2007, pp. 1-6.
Mann, Vijay, etal., "Crossroads: Seamless VM Mobility Across Data Centers Through Software Defined Networking," IEEE Network Operations and Management Symposium (NOMS), Apr. 16-20, 2012, pp. 88-96, IEEE, Piscataway, NJ, US.
McKeown, Nick, et al., "OpenFlow: Enabling Innovation in Campus Networks," ACS SIGCOMM Computer communication Review, Apr. 2008, pp. 69-74, vol. 38, No. 2.
Mogul, Jeffrey C., et al., "API Design Challenges for Open Router Platforms on Proprietary Hardware," Oct. 2008, pp. 1-6.
Popa, Lucian, et al., "Building Extensible Networks with Rule-Based Forwarding," In USENIX OSDI, Month Unknown, 2010, pp. 1-14.
Portions of prosecution history of AU2012340383, Mar. 19, 2015, Nicira, Inc.
Portions of prosecution history of AU2012340387, Mar. 17, 2015, Nicira, Inc.
Portions of prosecution history of EP12849015.8, Jan. 29, 2015, Nicira, Inc.
Portions of prosecution history of EP12849104.0, Jan. 30, 2015, Nicira, Inc.
Portions of prosecution history of EP12849295.6, Mar. 24, 2015, Nicira, Inc.
Portions of prosecution history of EP12849710.4, Jan. 12, 2015, Nicira, Inc.
Portions of prosecution history of EP12850519.5, Jan. 12, 2015, Nicira, Inc.
Portions of prosecution history of EP12850665.6, Oct. 9, 2014, Nicira, Inc.
Portions of prosecution history of U.S. Appl. No. 13/678,485, Jun. 26, 2014, Nicira, Inc.
Portions of prosecution history of U.S. Appl. No. 13/678,498, Jun. 25, 2014, Nicira, Inc.
Portions of prosecution history of U.S. Appl. No. 13/678,504, Jul. 9, 2014, Nicira, Inc.
Portions of prosecution history of U.S. Appl. No. 13/678,512, Jul. 23, 2014, Nicira, Inc.
Portions of prosecution history of U.S. Appl. No. 13/678,518, Aug. 18, 2014, Nicira, Inc.
Portions of prosecution history of U.S. Appl. No. 13/678,536, Mar. 18, 2015, Padmanabhan, Amar, et al.
Sekar, Vyas, et al., "Design and Implementation of a Consolidated Middlebox Architecture," In Proc. of NSDI, Month Unknown, 2012, 14 pages.
Shenker, Scott, et al., "The Future of Networking, and the Past of Protocols," Dec. 2, 2011, pp. 1-30, USA.
Sherry, Justine, et al., "Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service," In Proc. of SIGCOMM '12, Aug. 13-17, 2012, 12 pages, Helsinki, Finland.
Stiemerling, M., et al., "Middlebox Communication (MIDCOM) Protocol Semandtics," Mar. 2008, 70 pages, Internet Engineering Task Force.
U.S. Appl. No. 14/549,512, filed Nov. 20, 2014, Koponen, Teemu, et al.
U.S. Appl. No. 14/595,195, filed Jan. 12, 2015, Zhang, Ronghua, et al.
U.S. Appl. No. 14/595,199, filed Jan. 12, 2015, Koponen, Teemu, et al.
Updated portions of prosecution history of U.S. Appl. No. 13/678,485, Jan. 23, 2015, Zhang, Ronghua, et al.
Updated portions of prosecution history of U.S. Appl. No. 13/678,498, Jan. 23, 2015, Koponen, Teemu, et al.
Updated portions of prosecution history of U.S. Appl. No. 13/678,504, Dec. 19, 2014, Koponen, Teemu, et al.
Updated portions of prosecution history of U.S. Appl. No. 13/678,512, Mar. 10, 2015, Padmanabhan, Amar, et al.
Updated portions of prosecution history of U.S. Appl. No. 13/678,518, Sep. 2, 2014, Koponen, Teemu, et al.
Wang, Wei-Ming, et al., "Analysis and Implementation of an Open Programmable Router Based on Forwarding and Control Element Separation," Sep. 2008, pp. 769-779, Journal of Computer Science and Technology.
WO 2013/074827 with International Search Report, May 23, 2013, Nicira, Inc.
WO 2013/074828 with International Search Report, May 23, 2013, Nicira, Inc.
WO 2013/074831 with International Search Report, May 23, 2013, Nicira, Inc.
WO 2013/074842 with International Search Report, May 23, 2013, Nicira, Inc.
WO 2013/074844 with International Search Report, May 23, 2013, Nicira, Inc.
WO 2013/074847 with International Search Report, May 23, 2013, Nicira, Inc.
WO 2013/074855 with International Search Report, May 23, 2013, Nicira, Inc.
Yang, L., et al., "Forwarding and Control Element Separation (ForCES) Framework," Apr. 2004, pp. 1-40, The Internet Society.

Cited By (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10977067B2 (en) 2011-11-15 2021-04-13 Nicira, Inc. Control plane interface for logical middlebox services
US9552219B2 (en) 2011-11-15 2017-01-24 Nicira, Inc. Migrating middlebox state for distributed middleboxes
US11372671B2 (en) 2011-11-15 2022-06-28 Nicira, Inc. Architecture of networks with middleboxes
US9697030B2 (en) 2011-11-15 2017-07-04 Nicira, Inc. Connection identifier assignment and source network address translation
US11740923B2 (en) 2011-11-15 2023-08-29 Nicira, Inc. Architecture of networks with middleboxes
US10089127B2 (en) 2011-11-15 2018-10-02 Nicira, Inc. Control plane interface for logical middlebox services
US10191763B2 (en) 2011-11-15 2019-01-29 Nicira, Inc. Architecture of networks with middleboxes
US10884780B2 (en) 2011-11-15 2021-01-05 Nicira, Inc. Architecture of networks with middleboxes
US10310886B2 (en) 2011-11-15 2019-06-04 Nicira, Inc. Network control system for configuring middleboxes
US11593148B2 (en) 2011-11-15 2023-02-28 Nicira, Inc. Network control system for configuring middleboxes
US10514941B2 (en) 2011-11-15 2019-12-24 Nicira, Inc. Load balancing and destination network address translation middleboxes
US10949248B2 (en) 2011-11-15 2021-03-16 Nicira, Inc. Load balancing and destination network address translation middleboxes
US9558027B2 (en) 2011-11-15 2017-01-31 Nicira, Inc. Network control system for configuring middleboxes
US10922124B2 (en) 2011-11-15 2021-02-16 Nicira, Inc. Network control system for configuring middleboxes
US10235199B2 (en) 2011-11-15 2019-03-19 Nicira, Inc. Migrating middlebox state for distributed middleboxes
US10789137B2 (en) 2013-02-01 2020-09-29 Formulus Black Corporation Fast system state cloning
US11805056B2 (en) 2013-05-09 2023-10-31 Nicira, Inc. Method and system for service switching using service tags
US11438267B2 (en) 2013-05-09 2022-09-06 Nicira, Inc. Method and system for service switching using service tags
US11296930B2 (en) 2014-09-30 2022-04-05 Nicira, Inc. Tunnel-enabled elastic service model
US11496606B2 (en) 2014-09-30 2022-11-08 Nicira, Inc. Sticky service sessions in a datacenter
US11405431B2 (en) 2015-04-03 2022-08-02 Nicira, Inc. Method, apparatus, and system for implementing a content switch
US10346047B2 (en) 2015-04-15 2019-07-09 Formulus Black Corporation Method and apparatus for dense hyper IO digital retention
US10606482B2 (en) 2015-04-15 2020-03-31 Formulus Black Corporation Method and apparatus for dense hyper IO digital retention
US10021066B2 (en) * 2015-05-18 2018-07-10 Morgan Stanley Clustered server sharing
US20160344690A1 (en) * 2015-05-18 2016-11-24 Morgan Stanley Clustered server sharing
US11496392B2 (en) 2015-06-27 2022-11-08 Nicira, Inc. Provisioning logical entities in a multidatacenter environment
US11038972B2 (en) * 2016-12-30 2021-06-15 Huawei Technologies Co., Ltd. Service providing method, apparatus, and system
US11750476B2 (en) 2017-10-29 2023-09-05 Nicira, Inc. Service operation chaining
US10572186B2 (en) 2017-12-18 2020-02-25 Formulus Black Corporation Random access memory (RAM)-based computer systems, devices, and methods
US11265187B2 (en) 2018-01-26 2022-03-01 Nicira, Inc. Specifying and utilizing paths through a network
US11805036B2 (en) 2018-03-27 2023-10-31 Nicira, Inc. Detecting failure of layer 2 service using broadcast messages
US11399075B2 (en) 2018-11-30 2022-07-26 Vmware, Inc. Distributed inline proxy
US11882196B2 (en) 2018-11-30 2024-01-23 VMware LLC Distributed inline proxy
US10725853B2 (en) 2019-01-02 2020-07-28 Formulus Black Corporation Systems and methods for memory failure prevention, management, and mitigation
US11467861B2 (en) 2019-02-22 2022-10-11 Vmware, Inc. Configuring distributed forwarding for performing service chain operations
US11354148B2 (en) 2019-02-22 2022-06-07 Vmware, Inc. Using service data plane for service control plane messaging
US11360796B2 (en) 2019-02-22 2022-06-14 Vmware, Inc. Distributed forwarding for performing service chain operations
US11604666B2 (en) 2019-02-22 2023-03-14 Vmware, Inc. Service path generation in load balanced manner
US11609781B2 (en) 2019-02-22 2023-03-21 Vmware, Inc. Providing services with guest VM mobility
US11397604B2 (en) 2019-02-22 2022-07-26 Vmware, Inc. Service path selection in load balanced manner
US11321113B2 (en) 2019-02-22 2022-05-03 Vmware, Inc. Creating and distributing service chain descriptions
US11301281B2 (en) 2019-02-22 2022-04-12 Vmware, Inc. Service control plane messaging in service data plane
US11288088B2 (en) 2019-02-22 2022-03-29 Vmware, Inc. Service control plane messaging in service data plane
US11294703B2 (en) 2019-02-22 2022-04-05 Vmware, Inc. Providing services by using service insertion and service transport layers
US11249784B2 (en) 2019-02-22 2022-02-15 Vmware, Inc. Specifying service chains
US11283717B2 (en) 2019-10-30 2022-03-22 Vmware, Inc. Distributed fault tolerant service chain
US11140218B2 (en) 2019-10-30 2021-10-05 Vmware, Inc. Distributed service chain across multiple clouds
US11722559B2 (en) 2019-10-30 2023-08-08 Vmware, Inc. Distributed service chain across multiple clouds
US20210368429A1 (en) * 2019-12-31 2021-11-25 Huawei Technologies Co., Ltd. Method and apparatus for obtaining network slice identifier
US11950179B2 (en) * 2019-12-31 2024-04-02 Huawei Technologies Co., Ltd. Method and apparatus for obtaining network slice identifier
US11223494B2 (en) 2020-01-13 2022-01-11 Vmware, Inc. Service insertion for multicast traffic at boundary
US11659061B2 (en) 2020-01-20 2023-05-23 Vmware, Inc. Method of adjusting service function chains to improve network performance
US11153406B2 (en) 2020-01-20 2021-10-19 Vmware, Inc. Method of network performance visualization of service function chains
US11528219B2 (en) 2020-04-06 2022-12-13 Vmware, Inc. Using applied-to field to identify connection-tracking records for different interfaces
US11743172B2 (en) 2020-04-06 2023-08-29 Vmware, Inc. Using multiple transport mechanisms to provide services at the edge of a network
US11153170B1 (en) 2020-04-06 2021-10-19 Vmware, Inc. Migration of data compute node across sites
US11792112B2 (en) 2020-04-06 2023-10-17 Vmware, Inc. Using service planes to perform services at the edge of a network
US11438257B2 (en) 2020-04-06 2022-09-06 Vmware, Inc. Generating forward and reverse direction connection-tracking records for service paths at a network edge
US11212356B2 (en) 2020-04-06 2021-12-28 Vmware, Inc. Providing services at the edge of a network using selected virtual tunnel interfaces
US11277331B2 (en) 2020-04-06 2022-03-15 Vmware, Inc. Updating connection-tracking records at a network edge using flow programming
US11368387B2 (en) 2020-04-06 2022-06-21 Vmware, Inc. Using router as service node through logical service plane
US11611625B2 (en) 2020-12-15 2023-03-21 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers
US11734043B2 (en) 2020-12-15 2023-08-22 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers

Also Published As

Publication number Publication date
US20130125120A1 (en) 2013-05-16
EP2748978A1 (en) 2014-07-02
EP2748717A4 (en) 2015-01-21
US20160070588A1 (en) 2016-03-10
AU2012340387A1 (en) 2014-04-10
US20170126493A1 (en) 2017-05-04
AU2012340383B2 (en) 2015-08-20
EP2748713A4 (en) 2015-02-11
JP2016146644A (en) 2016-08-12
JP5714187B2 (en) 2015-05-07
US20210191750A1 (en) 2021-06-24
US10514941B2 (en) 2019-12-24
AU2012340387B2 (en) 2015-08-20
US20210149708A1 (en) 2021-05-20
US10884780B2 (en) 2021-01-05
US20190138343A1 (en) 2019-05-09
US9015823B2 (en) 2015-04-21
JP2014535252A (en) 2014-12-25
US20170277557A1 (en) 2017-09-28
US20190258507A1 (en) 2019-08-22
US20130132532A1 (en) 2013-05-23
US10235199B2 (en) 2019-03-19
US20150222598A1 (en) 2015-08-06
WO2013074855A1 (en) 2013-05-23
EP2748717B1 (en) 2021-03-24
EP2748714A1 (en) 2014-07-02
US11740923B2 (en) 2023-08-29
US20130132531A1 (en) 2013-05-23
EP2748978B1 (en) 2018-04-25
US20210200572A1 (en) 2021-07-01
EP2748750A4 (en) 2015-04-08
CN103917967A (en) 2014-07-09
EP3373560B1 (en) 2022-08-10
EP2748716A1 (en) 2014-07-02
US20150081861A1 (en) 2015-03-19
CN107395445B (en) 2021-04-13
US9306909B2 (en) 2016-04-05
US8913611B2 (en) 2014-12-16
CN107395445A (en) 2017-11-24
US8966029B2 (en) 2015-02-24
EP2748714A4 (en) 2015-01-21
WO2013074842A1 (en) 2013-05-23
US20200081732A1 (en) 2020-03-12
US20130132536A1 (en) 2013-05-23
US20170116023A1 (en) 2017-04-27
WO2013074844A1 (en) 2013-05-23
US20230205568A1 (en) 2023-06-29
US11593148B2 (en) 2023-02-28
EP2748978A4 (en) 2015-05-20
EP2748750B1 (en) 2020-03-18
US9697030B2 (en) 2017-07-04
US9552219B2 (en) 2017-01-24
US9697033B2 (en) 2017-07-04
US9172603B2 (en) 2015-10-27
JP5898780B2 (en) 2016-04-06
JP5961718B2 (en) 2016-08-02
JP6346690B2 (en) 2018-06-20
US10922124B2 (en) 2021-02-16
CN103917967B (en) 2016-10-05
WO2013074827A1 (en) 2013-05-23
CN103930882A (en) 2014-07-16
EP2748750A1 (en) 2014-07-02
EP2748713B1 (en) 2021-08-25
EP2748717A1 (en) 2014-07-02
US20150124651A1 (en) 2015-05-07
US20150142938A1 (en) 2015-05-21
US8966024B2 (en) 2015-02-24
WO2013074828A1 (en) 2013-05-23
JP2014533901A (en) 2014-12-15
EP3373560A1 (en) 2018-09-12
US9558027B2 (en) 2017-01-31
US11372671B2 (en) 2022-06-28
EP3846043B1 (en) 2024-02-14
US10089127B2 (en) 2018-10-02
JP2015146598A (en) 2015-08-13
US10977067B2 (en) 2021-04-13
WO2013074831A1 (en) 2013-05-23
US20220326980A1 (en) 2022-10-13
US10949248B2 (en) 2021-03-16
US20190034220A1 (en) 2019-01-31
EP2748714B1 (en) 2021-01-13
WO2013074847A1 (en) 2013-05-23
EP3846043A1 (en) 2021-07-07
EP2748716A4 (en) 2015-02-11
US10191763B2 (en) 2019-01-29
JP6125682B2 (en) 2017-05-10
AU2012340383A1 (en) 2014-04-10
US10310886B2 (en) 2019-06-04
US20230359479A1 (en) 2023-11-09
CN103930882B (en) 2017-10-03
US20130132533A1 (en) 2013-05-23
US20130128891A1 (en) 2013-05-23
JP2017153118A (en) 2017-08-31
US20150098360A1 (en) 2015-04-09
EP2748713A1 (en) 2014-07-02
EP2748716B1 (en) 2018-05-16
US20130121209A1 (en) 2013-05-16
US20130125230A1 (en) 2013-05-16

Similar Documents

Publication Publication Date Title
US10235199B2 (en) Migrating middlebox state for distributed middleboxes
AU2018204247B2 (en) Architecture of networks with middleboxes

Legal Events

Date Code Title Description
AS Assignment

Owner name: NICIRA, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZHANG, RONGHUA;KOPONEN, TEEMU;THAKKAR, PANKAJ;AND OTHERS;REEL/FRAME:029740/0816

Effective date: 20130128

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8